Remote Code Execution (RCE) Affecting dtale package, versions [,3.14.1)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.07% (32nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-DTALE-7926878
- published 11 Sep 2024
- disclosed 10 Sep 2024
- credit Aftersnows
Introduced: 10 Sep 2024
CVE-2024-45595 Open this link in a new tabHow to fix?
Upgrade dtale
to version 3.14.1 or higher.
Overview
dtale is a Web Client for Visualizing Pandas Objects
Affected versions of this package are vulnerable to Remote Code Execution (RCE) via the run_query
function due to improper sanitization of the query
parameter. An attacker can execute arbitrary code on the server by sending malicious input.
Note:
This is only exploitable if "Custom Filter" input is turned on, which is the default option.
CVE-2024-8862 is a duplicate of this vulnerability.