CVE-2024-36105 (GCVE-0-2024-36105)
Vulnerability from cvelistv5
Published
2024-05-27 17:17
Modified
2024-08-21 14:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1327 - Binding to an Unrestricted IP Address
Summary
dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `''` represents `INADDR_ANY`, equivalent to `"0.0.0.0"`. On systems with IPv6, '' represents `IN6ADDR_ANY`, which is equivalent to `"::"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.
References
| ► | URL | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:30:12.980Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349"
},
{
"name": "https://github.com/dbt-labs/dbt-core/issues/10209",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/issues/10209"
},
{
"name": "https://github.com/dbt-labs/dbt-core/pull/10208",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/pull/10208"
},
{
"name": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7"
},
{
"name": "https://cwe.mitre.org/data/definitions/1327.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cwe.mitre.org/data/definitions/1327.html"
},
{
"name": "https://docs.python.org/3/library/socket.html#socket-families",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://docs.python.org/3/library/socket.html#socket-families"
},
{
"name": "https://docs.securesauce.dev/rules/PY030",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://docs.securesauce.dev/rules/PY030"
},
{
"name": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dbt-labs:dbt-core:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"lessThan": "1.6.15",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "1.7.15",
"status": "affected",
"version": "1.7.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:dbt-labs:dbt-core:1.8.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"status": "affected",
"version": "1.8.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-36105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-21T13:52:53.518603Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-21T14:20:58.463Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"status": "affected",
"version": "\u003c 1.6.15"
},
{
"status": "affected",
"version": "\u003e= 1.7.0, \u003c 1.7.15"
},
{
"status": "affected",
"version": "= 1.8.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\"0.0.0.0\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\"::\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1327",
"description": "CWE-1327: Binding to an Unrestricted IP Address",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-27T17:17:39.875Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349"
},
{
"name": "https://github.com/dbt-labs/dbt-core/issues/10209",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/issues/10209"
},
{
"name": "https://github.com/dbt-labs/dbt-core/pull/10208",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/pull/10208"
},
{
"name": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7"
},
{
"name": "https://cwe.mitre.org/data/definitions/1327.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://cwe.mitre.org/data/definitions/1327.html"
},
{
"name": "https://docs.python.org/3/library/socket.html#socket-families",
"tags": [
"x_refsource_MISC"
],
"url": "https://docs.python.org/3/library/socket.html#socket-families"
},
{
"name": "https://docs.securesauce.dev/rules/PY030",
"tags": [
"x_refsource_MISC"
],
"url": "https://docs.securesauce.dev/rules/PY030"
},
{
"name": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1"
}
],
"source": {
"advisory": "GHSA-pmrx-695r-4349",
"discovery": "UNKNOWN"
},
"title": "dbt allows Binding to an Unrestricted IP Address via socketsocket"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-36105",
"datePublished": "2024-05-27T17:17:39.875Z",
"dateReserved": "2024-05-20T21:07:48.186Z",
"dateUpdated": "2024-08-21T14:20:58.463Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"name\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"name\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"name\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"name\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"name\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"name\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"name\": \"https://docs.securesauce.dev/rules/PY030\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"name\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:30:12.980Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-36105\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-21T13:52:53.518603Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:dbt-labs:dbt-core:*:*:*:*:*:*:*:*\"], \"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.6.15\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.7.0\", \"lessThan\": \"1.7.15\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:dbt-labs:dbt-core:1.8.0:*:*:*:*:*:*:*\"], \"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.8.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-21T14:20:52.013Z\"}}], \"cna\": {\"title\": \"dbt allows Binding to an Unrestricted IP Address via socketsocket\", \"source\": {\"advisory\": \"GHSA-pmrx-695r-4349\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.6.15\"}, {\"status\": \"affected\", \"version\": \"\u003e= 1.7.0, \u003c 1.7.15\"}, {\"status\": \"affected\", \"version\": \"= 1.8.0\"}]}], \"references\": [{\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"name\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"name\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"name\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"name\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"name\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"name\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"name\": \"https://docs.securesauce.dev/rules/PY030\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"name\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\\\"0.0.0.0\\\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\\\"::\\\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1327\", \"description\": \"CWE-1327: Binding to an Unrestricted IP Address\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-05-27T17:17:39.875Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-36105\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-21T14:20:58.463Z\", \"dateReserved\": \"2024-05-20T21:07:48.186Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-05-27T17:17:39.875Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…