{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-45595","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-09-02T16:00:02.423Z","datePublished":"2024-09-10T16:03:56.717Z","dateUpdated":"2024-09-10T18:56:57.922Z"},"containers":{"cna":{"title":"D-Tale allows Remote Code Execution through the Query input on Chart Builder","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/man-group/dtale/security/advisories/GHSA-pw44-4h99-wqff","tags":["x_refsource_CONFIRM"],"url":"https://github.com/man-group/dtale/security/advisories/GHSA-pw44-4h99-wqff"},{"name":"https://github.com/man-group/dtale/commit/b6e30969390520d1400b55acbb13e5487b8472e8","tags":["x_refsource_MISC"],"url":"https://github.com/man-group/dtale/commit/b6e30969390520d1400b55acbb13e5487b8472e8"},{"name":"https://github.com/man-group/dtale#custom-filter","tags":["x_refsource_MISC"],"url":"https://github.com/man-group/dtale#custom-filter"}],"affected":[{"vendor":"man-group","product":"dtale","versions":[{"version":"<  3.14.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-09-10T16:03:56.717Z"},"descriptions":[{"lang":"en","value":"D-Tale is a visualizer for Pandas data structures. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. Users should upgrade to version 3.14.1 where the \"Custom Filter\" input is turned off by default."}],"source":{"advisory":"GHSA-pw44-4h99-wqff","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-10T18:56:46.364218Z","id":"CVE-2024-45595","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-10T18:56:57.922Z"}}]}}