Description

man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.

INFO

Published Date :

2024-06-06T18:54:43.713Z

Last Modified :

2024-11-03T18:27:22.142Z

Source :

@huntr_ai
AFFECTED PRODUCTS

The following products are affected by CVE-2024-3408 vulnerability.

Vendors Products
Man
  • D-tale
Man-group
  • Dtale
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-3408.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact