CVE-2024-47833

Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*

History

16 Oct 2024, 16:33

Type Values Removed Values Added
References () https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp - () https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp - Exploit, Third Party Advisory
CWE CWE-732
CWE-319
First Time Avaiga
Avaiga taipy
CPE cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

10 Oct 2024, 12:51

Type Values Removed Values Added
Summary
  • (es) Taipy es una librería Python de código abierto que permite el desarrollo de aplicaciones de extremo a extremo para científicos de datos e ingenieros de aprendizaje automático. En las versiones afectadas, las cookies de sesión se envían sin los indicadores Secure y HTTPOnly. Este problema se ha solucionado en la versión 4.0.0 y se recomienda a todos los usuarios que actualicen la versión. No se conocen workarounds para esta vulnerabilidad.

09 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 19:15

Updated : 2024-10-16 16:33


NVD link : CVE-2024-47833

Mitre link : CVE-2024-47833

CVE.ORG link : CVE-2024-47833


JSON object : View

Products Affected

avaiga

  • taipy
CWE
CWE-319

Cleartext Transmission of Sensitive Information

CWE-732

Incorrect Permission Assignment for Critical Resource

CWE-1004

Sensitive Cookie Without 'HttpOnly' Flag

CWE-614

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute