CVE-2024-36105

dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `''` represents `INADDR_ANY`, equivalent to `"0.0.0.0"`. On systems with IPv6, '' represents `IN6ADDR_ANY`, which is equivalent to `"::"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.
Configurations

No configuration.

History

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://cwe.mitre.org/data/definitions/1327.html - () https://cwe.mitre.org/data/definitions/1327.html -
References () https://docs.python.org/3/library/socket.html#socket-families - () https://docs.python.org/3/library/socket.html#socket-families -
References () https://docs.securesauce.dev/rules/PY030 - () https://docs.securesauce.dev/rules/PY030 -
References () https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39 - () https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39 -
References () https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7 - () https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7 -
References () https://github.com/dbt-labs/dbt-core/issues/10209 - () https://github.com/dbt-labs/dbt-core/issues/10209 -
References () https://github.com/dbt-labs/dbt-core/pull/10208 - () https://github.com/dbt-labs/dbt-core/pull/10208 -
References () https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15 - () https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15 -
References () https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15 - () https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15 -
References () https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1 - () https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1 -
References () https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349 - () https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349 -

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) dbt permite a los ingenieros y analistas de datos transformar sus datos utilizando las mismas prácticas que utilizan los ingenieros de software para crear aplicaciones. Antes de las versiones 1.6.15, 1.7.15 y 1.8.1, el enlace a `INADDR_ANY (0.0.0.0)` o `IN6ADDR_ANY (::)` expone una aplicación en todas las interfaces de red, lo que aumenta el riesgo de acceso no autorizado. Como se indica en los documentos de Python, se acepta una forma especial para la dirección en lugar de una dirección de host: `''` representa `INADDR_ANY`, equivalente a `"0.0.0.0"`. En sistemas con IPv6, '' representa `IN6ADDR_ANY`, que equivale a `"::"`. Un usuario que entrega documentos en una red pública no segura puede, sin saberlo, alojar un sitio web no seguro (http) al que cualquier usuario/sistema remoto pueda acceder en la misma red. El problema se ha mitigado en dbt-core v1.6.15, dbt-core v1.7.15 y dbt-core v1.8.1 vinculando explícitamente a localhost de forma predeterminada en "dbt docsserve".

27 May 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-27 18:15

Updated : 2024-11-21 09:21


NVD link : CVE-2024-36105

Mitre link : CVE-2024-36105

CVE.ORG link : CVE-2024-36105


JSON object : View

Products Affected

No product.

CWE
CWE-1327

Binding to an Unrestricted IP Address