CVE-2024-36105 (GCVE-0-2024-36105)
Vulnerability from cvelistv5 – Published: 2024-05-27 17:17 – Updated: 2024-08-21 14:20
VLAI?
Summary
dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `''` represents `INADDR_ANY`, equivalent to `"0.0.0.0"`. On systems with IPv6, '' represents `IN6ADDR_ANY`, which is equivalent to `"::"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.
Severity ?
5.3 (Medium)
CWE
- CWE-1327 - Binding to an Unrestricted IP Address
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:30:12.980Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349"
},
{
"name": "https://github.com/dbt-labs/dbt-core/issues/10209",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/issues/10209"
},
{
"name": "https://github.com/dbt-labs/dbt-core/pull/10208",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/pull/10208"
},
{
"name": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7"
},
{
"name": "https://cwe.mitre.org/data/definitions/1327.html",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cwe.mitre.org/data/definitions/1327.html"
},
{
"name": "https://docs.python.org/3/library/socket.html#socket-families",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://docs.python.org/3/library/socket.html#socket-families"
},
{
"name": "https://docs.securesauce.dev/rules/PY030",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://docs.securesauce.dev/rules/PY030"
},
{
"name": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dbt-labs:dbt-core:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"lessThan": "1.6.15",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "1.7.15",
"status": "affected",
"version": "1.7.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:dbt-labs:dbt-core:1.8.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"status": "affected",
"version": "1.8.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-36105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-21T13:52:53.518603Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-21T14:20:58.463Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "dbt-core",
"vendor": "dbt-labs",
"versions": [
{
"status": "affected",
"version": "\u003c 1.6.15"
},
{
"status": "affected",
"version": "\u003e= 1.7.0, \u003c 1.7.15"
},
{
"status": "affected",
"version": "= 1.8.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\"0.0.0.0\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\"::\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1327",
"description": "CWE-1327: Binding to an Unrestricted IP Address",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-27T17:17:39.875Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349"
},
{
"name": "https://github.com/dbt-labs/dbt-core/issues/10209",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/issues/10209"
},
{
"name": "https://github.com/dbt-labs/dbt-core/pull/10208",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/pull/10208"
},
{
"name": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7"
},
{
"name": "https://cwe.mitre.org/data/definitions/1327.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://cwe.mitre.org/data/definitions/1327.html"
},
{
"name": "https://docs.python.org/3/library/socket.html#socket-families",
"tags": [
"x_refsource_MISC"
],
"url": "https://docs.python.org/3/library/socket.html#socket-families"
},
{
"name": "https://docs.securesauce.dev/rules/PY030",
"tags": [
"x_refsource_MISC"
],
"url": "https://docs.securesauce.dev/rules/PY030"
},
{
"name": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15"
},
{
"name": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1"
}
],
"source": {
"advisory": "GHSA-pmrx-695r-4349",
"discovery": "UNKNOWN"
},
"title": "dbt allows Binding to an Unrestricted IP Address via socketsocket"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-36105",
"datePublished": "2024-05-27T17:17:39.875Z",
"dateReserved": "2024-05-20T21:07:48.186Z",
"dateUpdated": "2024-08-21T14:20:58.463Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\\\"0.0.0.0\\\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\\\"::\\\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\\n\"}, {\"lang\": \"es\", \"value\": \"dbt permite a los ingenieros y analistas de datos transformar sus datos utilizando las mismas pr\\u00e1cticas que utilizan los ingenieros de software para crear aplicaciones. Antes de las versiones 1.6.15, 1.7.15 y 1.8.1, el enlace a `INADDR_ANY (0.0.0.0)` o `IN6ADDR_ANY (::)` expone una aplicaci\\u00f3n en todas las interfaces de red, lo que aumenta el riesgo de acceso no autorizado. Como se indica en los documentos de Python, se acepta una forma especial para la direcci\\u00f3n en lugar de una direcci\\u00f3n de host: `\u0027\u0027` representa `INADDR_ANY`, equivalente a `\\\"0.0.0.0\\\"`. En sistemas con IPv6, \u0027\u0027 representa `IN6ADDR_ANY`, que equivale a `\\\"::\\\"`. Un usuario que entrega documentos en una red p\\u00fablica no segura puede, sin saberlo, alojar un sitio web no seguro (http) al que cualquier usuario/sistema remoto pueda acceder en la misma red. El problema se ha mitigado en dbt-core v1.6.15, dbt-core v1.7.15 y dbt-core v1.8.1 vinculando expl\\u00edcitamente a localhost de forma predeterminada en \\\"dbt docsserve\\\".\"}]",
"id": "CVE-2024-36105",
"lastModified": "2024-11-21T09:21:37.160",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
"published": "2024-05-27T18:15:10.613",
"references": "[{\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1327\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-36105\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-05-27T18:15:10.613\",\"lastModified\":\"2024-11-21T09:21:37.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\\\"0.0.0.0\\\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\\\"::\\\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\\n\"},{\"lang\":\"es\",\"value\":\"dbt permite a los ingenieros y analistas de datos transformar sus datos utilizando las mismas pr\u00e1cticas que utilizan los ingenieros de software para crear aplicaciones. Antes de las versiones 1.6.15, 1.7.15 y 1.8.1, el enlace a `INADDR_ANY (0.0.0.0)` o `IN6ADDR_ANY (::)` expone una aplicaci\u00f3n en todas las interfaces de red, lo que aumenta el riesgo de acceso no autorizado. Como se indica en los documentos de Python, se acepta una forma especial para la direcci\u00f3n en lugar de una direcci\u00f3n de host: `\u0027\u0027` representa `INADDR_ANY`, equivalente a `\\\"0.0.0.0\\\"`. En sistemas con IPv6, \u0027\u0027 representa `IN6ADDR_ANY`, que equivale a `\\\"::\\\"`. Un usuario que entrega documentos en una red p\u00fablica no segura puede, sin saberlo, alojar un sitio web no seguro (http) al que cualquier usuario/sistema remoto pueda acceder en la misma red. El problema se ha mitigado en dbt-core v1.6.15, dbt-core v1.7.15 y dbt-core v1.8.1 vinculando expl\u00edcitamente a localhost de forma predeterminada en \\\"dbt docsserve\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1327\"}]}],\"references\":[{\"url\":\"https://cwe.mitre.org/data/definitions/1327.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://docs.python.org/3/library/socket.html#socket-families\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://docs.securesauce.dev/rules/PY030\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/issues/10209\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/pull/10208\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://cwe.mitre.org/data/definitions/1327.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.python.org/3/library/socket.html#socket-families\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.securesauce.dev/rules/PY030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/issues/10209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/pull/10208\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"name\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"name\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"name\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"name\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"name\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"name\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"name\": \"https://docs.securesauce.dev/rules/PY030\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"name\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:30:12.980Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-36105\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-21T13:52:53.518603Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:dbt-labs:dbt-core:*:*:*:*:*:*:*:*\"], \"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.6.15\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.7.0\", \"lessThan\": \"1.7.15\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:dbt-labs:dbt-core:1.8.0:*:*:*:*:*:*:*\"], \"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.8.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-21T14:20:52.013Z\"}}], \"cna\": {\"title\": \"dbt allows Binding to an Unrestricted IP Address via socketsocket\", \"source\": {\"advisory\": \"GHSA-pmrx-695r-4349\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"dbt-labs\", \"product\": \"dbt-core\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.6.15\"}, {\"status\": \"affected\", \"version\": \"\u003e= 1.7.0, \u003c 1.7.15\"}, {\"status\": \"affected\", \"version\": \"= 1.8.0\"}]}], \"references\": [{\"url\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"name\": \"https://github.com/dbt-labs/dbt-core/security/advisories/GHSA-pmrx-695r-4349\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"name\": \"https://github.com/dbt-labs/dbt-core/issues/10209\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"name\": \"https://github.com/dbt-labs/dbt-core/pull/10208\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"name\": \"https://github.com/dbt-labs/dbt-core/commit/0c08d7a19ad1740be3cb0b2e6d9d64f6537176f7\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"name\": \"https://cwe.mitre.org/data/definitions/1327.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"name\": \"https://docs.python.org/3/library/socket.html#socket-families\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://docs.securesauce.dev/rules/PY030\", \"name\": \"https://docs.securesauce.dev/rules/PY030\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"name\": \"https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"name\": \"https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Prior to versions 1.6.15, 1.7.15, and 1.8.1, Binding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access. As stated in the Python docs, a special form for address is accepted instead of a host address: `\u0027\u0027` represents `INADDR_ANY`, equivalent to `\\\"0.0.0.0\\\"`. On systems with IPv6, \u0027\u0027 represents `IN6ADDR_ANY`, which is equivalent to `\\\"::\\\"`. A user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network. The issue has has been mitigated in dbt-core v1.6.15, dbt-core v1.7.15, and dbt-core v1.8.1 by binding to localhost explicitly by default in `dbt docs serve`.\\n\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1327\", \"description\": \"CWE-1327: Binding to an Unrestricted IP Address\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-05-27T17:17:39.875Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-36105\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-21T14:20:58.463Z\", \"dateReserved\": \"2024-05-20T21:07:48.186Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-05-27T17:17:39.875Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…