D-Tale Command Execution Vulnerability
Moderate severity
GitHub Reviewed
Published
Sep 16, 2024
to the GitHub Advisory Database
•
Updated Sep 20, 2024
Description
Published by the National Vulnerability Database
Sep 14, 2024
Published to the GitHub Advisory Database
Sep 16, 2024
Reviewed
Sep 20, 2024
Last updated
Sep 20, 2024
D-Tale is the combination of a Flask back-end and a React front-end to bring you an easy way to view & analyze Pandas data structures. In dtale\views.py, under the route @dtale.route("/chart-data/<data_id>"), the query parameters from the request are directly passed into run_query for execution. And the run_query function calls proceed without performing any processing or sanitization of the query parameter. As a result, the query is directly used in the df.query method for data retrieval. Tthe engine used is
python
, which allows executing the query expression ans leading to a command execution vulnerability.References