Skip to content

Remote code execution in datalens-ui

High
resure published GHSA-6278-2wvc-4p93 Mar 28, 2024

Package

ghcr.io/datalens-tech/datalens-ui

Affected versions

< 0.1449.0

Patched versions

>= 0.1449.0

Description

Impact

A specifically crafted request allowed the creation of a special chart type with the ability to pass custom javascript code that would later be executed in an unprotected sandbox on subsequent requests to that chart.

Patches

The problem was fixed in the datalens-ui version 0.1449.0.

Workarounds

Restricting access to the API for creating or modifying charts (/charts/api/charts/v1/) would mitigate the issue.

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2024-29890

Weaknesses

No CWEs