dtale@2.12.3 vulnerabilities

Web Client for Visualizing Pandas Objects

  • latest version

    3.17.0

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the dtale package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    dtale is a Web Client for Visualizing Pandas Objects

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the update-settings endpoint, allowing an attacker to use enable_custom_filters to specify custom filters will be used for exploitation of this vulnerability.

    Note: This is only exploitable if D-Tale is hosted publicly without restricting access to trusted users.

    How to fix Cross-site Scripting (XSS)?

    Upgrade dtale to version 3.16.1 or higher.

    [,3.16.1)
    • M
    Remote Code Execution (RCE)

    [,3.14.1)
    • M
    Remote Code Execution (RCE)

    dtale is a Web Client for Visualizing Pandas Objects

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) via the run_query function due to improper sanitization of the query parameter. An attacker can execute arbitrary code on the server by sending malicious input.

    Note:

    This is only exploitable if "Custom Filter" input is turned on, which is the default option.

    CVE-2024-8862 is a duplicate of this vulnerability.

    How to fix Remote Code Execution (RCE)?

    Upgrade dtale to version 3.14.1 or higher.

    [,3.14.1)
    • H
    Improper Input Validation

    dtale is a Web Client for Visualizing Pandas Objects

    Affected versions of this package are vulnerable to Improper Input Validation due to the use of a hardcoded SECRET_KEY in the flask configuration and improper restriction of custom filter queries. An attacker can forge a session cookie and execute arbitrary code on the server by bypassing the authentication mechanisms and exploiting the /update-settings endpoint, even when enable_custom_filters is not enabled.

    Note:

    This vulnerability can be exploited only if authentication is enabled.

    How to fix Improper Input Validation?

    Upgrade dtale to version 3.13.1 or higher.

    [,3.13.1)
    • M
    Server-Side Request Forgery (SSRF)

    dtale is a Web Client for Visualizing Pandas Objects

    Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via the "Load From the Web" feature. An attacker can access files on the server by sending crafted requests that exploit improper input validation.

    How to fix Server-Side Request Forgery (SSRF)?

    Upgrade dtale to version 3.9.0 or higher.

    [,3.9.0)
    • M
    Cross-site Scripting (XSS)

    dtale is a Web Client for Visualizing Pandas Objects

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when the 'Custom Filter' input is enabled. An attacker can execute malicious code on the server by exploiting this vulnerability. This is only exploitable if D-Tale is hosted publicly.

    Mitigation: This vulnerability can be mitigated by turning off 'Custom Filter' input by default or only hosting D-Tale to trusted users.

    How to fix Cross-site Scripting (XSS)?

    Upgrade dtale to version 3.7.0 or higher.

    [,3.7.0)