D-Tale allows Remote Code Execution through the Custom Filter Input
Description
Published by the National Vulnerability Database
Dec 13, 2024
Published to the GitHub Advisory Database
Dec 13, 2024
Reviewed
Dec 13, 2024
Last updated
Dec 13, 2024
Impact
Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server.
Patches
Users should upgrade to version 3.16.1 where the
update-settings
endpoint blocks the ability for users to update theenable_custom_filters
flag. You can find out more information on how to turn that flag on hereWorkarounds
The only workaround for versions earlier than 3.16.1 is to only host D-Tale to trusted users.
References
See "Custom Filter" documentation
References