Information Exposure Affecting datasette package, versions [1.0a0, 1.0a4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DATASETTE-5849596
  • published23 Aug 2023
  • disclosed22 Aug 2023
  • creditUnknown

Introduced: 22 Aug 2023

CVE-2023-40570  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade datasette to version 1.0a4 or higher.

Overview

datasette is an An open source multi-tool for exploring and publishing data

Affected versions of this package are vulnerable to Information Exposure due to leaking names of databases and tables to unauthenticated users. Note: you are only affected if you have authentication enabled via a plugin such as datasette-auth-passwords.

Workaround

To work around this issue, block all traffic to the /-/api endpoint. This can be done with a proxy such as Apache or NGINX, or by installing the datasette-block plugin and adding the following configuration to your metadata.json or metadata.yml file:

{
    "plugins": {
        "datasette-block": {
            "prefixes": ["/-/api"]
        }
    }
}

This will block access to the API explorer but will still allow access to the Datasette read or write JSON APIs, as those use different URL patterns within the Datasette /database hierarchy.

References

CVSS Scores

version 3.1