icon

We found results for “

CVE-2024-3408

Date: June 6, 2024

man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded "SECRET_KEY" in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the "/update-settings" endpoint, even when "enable_custom_filters" is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Improper Input Validation

CWE-20

Use of Hard-coded Credentials

CWE-798

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us