dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `''` represents `INADDR_ANY`, equivalent to `"0.0.0.0"`. On systems with IPv6, '' represents `IN6ADDR_ANY`, which is equivalent to `"::"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.
References
Configurations
No configuration.
History
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://cwe.mitre.org/data/definitions/1327.html - | |
References | () https://docs.python.org/3/library/socket.html#socket-families - | |
References | () https://docs.securesauce.dev/rules/PY030 - | |
References | () https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39 - | |
References | () https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7 - | |
References | () https://github.com/dbt-labs/dbt-core/issues/10209 - | |
References | () https://github.com/dbt-labs/dbt-core/pull/10208 - | |
References | () https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15 - | |
References | () https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15 - | |
References | () https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1 - | |
References | () https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349 - |
28 May 2024, 12:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-27 18:15
Updated : 2024-11-21 09:21
NVD link : CVE-2024-36105
Mitre link : CVE-2024-36105
CVE.ORG link : CVE-2024-36105
JSON object : View
Products Affected
No product.
CWE
CWE-1327
Binding to an Unrestricted IP Address