Skip to content

Reflected cross-site scripting issue in Datasette

High severity GitHub Reviewed Published Jun 10, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

pip datasette (pip)

Affected versions

< 0.56.1

Patched versions

0.56.1

Description

Datasette is an open source multi-tool for exploring and publishing data. The ?_trace=1 debugging feature in Datasette does not correctly escape generated HTML, resulting in a reflected cross-site scripting vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as datasette-auth-passwords as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with ?_trace= or &_trace= in their query string parameters.

References

Published by the National Vulnerability Database Jun 7, 2021
Reviewed Jun 9, 2021
Published to the GitHub Advisory Database Jun 10, 2021
Last updated Feb 1, 2023

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2021-32670

GHSA ID

GHSA-gff3-739c-gxfq

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.