CVE-2024-55890: D-Tale allows Remote Code Execution through the Custom Filter Input
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62277%
CWE
Published
12/13/2024
Updated
12/13/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dtale | pip | < 3.16.1 | 3.16.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the ability to enable custom filters through the update-settings endpoint. The patch in commit 1e26ed3 specifically adds validation to block 'enable_custom_filters' modifications in views.py. The unpatched version of update_settings() lacked this protection, allowing attackers to activate the dangerous custom filter feature remotely. The GHSA advisory and CVE description explicitly link RCE to improper access control of this flag through the update-settings endpoint.