NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 09:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zauberzeug/nicegui/commit/ed12eb14f2a6c48b388a05c04b3c5a107ea9d330 - | |
References | () https://github.com/zauberzeug/nicegui/security/advisories/GHSA-mwc7-64wg-pgvj - | |
References | () https://huntr.com/bounties/29ec621a-bd69-4225-ab0f-5bb8a1d10c67 - |
15 Apr 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Apr 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-12 21:15
Updated : 2024-11-21 09:14
NVD link : CVE-2024-32005
Mitre link : CVE-2024-32005
CVE.ORG link : CVE-2024-32005
JSON object : View
Products Affected
No product.