CVE-2024-21642
Python vulnerability analysis and mitigation

Overview

D-Tale, a visualizer for Pandas data structures, versions prior to 3.9.0 contain a server-side request forgery (SSRF) vulnerability. The vulnerability was discovered on December 11, 2023, and publicly disclosed on January 5, 2024, when it was assigned CVE-2024-21642. The vulnerability affects all versions of D-Tale before version 3.9.0 when hosted publicly (GitHub Advisory).

Technical details

The vulnerability exists in the web_upload function in dtale/views.py, which takes a user-controlled url parameter and passes it to loader_func in dtale/cli/loaders/csv_loader.py. This is then passed to the handle_path function in dtale/cli/utils.py, which makes a GET request using the destination defined in the url. The lack of limitations on the url parameter leads to server-side request forgery. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (SecurityLab).

Impact

The vulnerability allows attackers to craft GET requests to internal and external resources on behalf of the server. This could enable access to resources on the internal network that the server has access to, even if these resources are not accessible from the internet. The issue allows viewing any files from arbitrary sources that D-Tale can process, including csv, tsv, json, excel, parquet and txt files. For all other file types, it functions as a blind server-side request forgery (SecurityLab).

Mitigation and workarounds

Users should upgrade to version 3.9.0, where the 'Load From the Web' input is turned off by default. For versions earlier than 3.9.0, the only workaround is to only host D-Tale to trusted users. The vulnerability can also be mitigated by ensuring D-Tale is not publicly accessible (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management