Home » Database

AVID-2026-R1407

Description

Vulnerability CVE-2024-21485

Details

Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that’s visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. Note: This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user.

Reason for inclusion in AVID: CVE-2024-21485 describes a Cross-site Scripting (XSS) vulnerability in Dash components (dash-core-components and dash-html-components). Dash is a widely used framework for building AI/ML dashboards and interfaces, and these components are dependencies in software stacks used to build, deploy, and monitor AI/ML systems. This constitutes a software supply-chain vulnerability affecting components that AI systems commonly rely on (data/feature visualization, model monitoring dashboards, etc.). The CVE clearly identifies a security flaw with potential data exposure and token theft, satisfying the security/safety criterion. Sufficient evidence is provided in the description and references.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemdash-core-components
Systemdash-core-components
Systemdash
Systemdash-html-components
Systemdash-html-components

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N/E:P
Base Score6.5
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionREQUIRED
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🟢 Low
Availability ImpactNONE

CWE

IDDescription
CWE-79Cross-site Scripting (XSS)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-02-02
  • Version: 0.3.3
  • AVID Entry