Miggo Logo

CVE-2024-36105: dbt allows Binding to an Unrestricted IP Address via socketsocket

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.4177%
Published
5/28/2024
Updated
5/28/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dbt-corepip< 1.6.151.6.15
dbt-corepip>= 1.7.0, < 1.7.151.7.15
dbt-corepip= 1.8.01.8.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the use of an empty string ('') in the TCPServer initialization, which binds to all interfaces. The code example in serve.py (line 23) explicitly shows this pattern. The fix in the commit replaces '' with '127.0.0.1', confirming this was the vulnerable line. The ServeTask.run() method is directly responsible for starting the server, making it the clear vulnerable function with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *in*in* to `IN***R_*NY (*.*.*.*)` or `IN****R_*NY (::)` *xpos*s *n *ppli**tion on *ll n*twork int*r****s, in*r**sin* t** risk o* un*ut*oriz** ****ss. W*il* *oin* som* st*ti* *n*lysis *n* *o** insp**tion, I *oun* t** *ollowin* *o** *in*i

Reasoning

T** vuln*r**ility st*ms *rom t** us* o* *n *mpty strin* ('') in t** T*PS*rv*r initi*liz*tion, w*i** *in*s to *ll int*r****s. T** *o** *x*mpl* in s*rv*.py (lin* **) *xpli*itly s*ows t*is p*tt*rn. T** *ix in t** *ommit r*pl***s '' wit* '***.*.*.*', *on