CVE-2024-47833

Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*

History

16 Oct 2024, 16:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:*
First Time Avaiga
Avaiga taipy
CWE CWE-1004
CWE-614
CWE-732
CWE-319
References () https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp - () https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp - Exploit, Third Party Advisory

09 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 19:15

Updated : 2024-10-16 16:33


NVD link : CVE-2024-47833

Mitre link : CVE-2024-47833


JSON object : View

Products Affected

avaiga

  • taipy
CWE
CWE-319

Cleartext Transmission of Sensitive Information

CWE-732

Incorrect Permission Assignment for Critical Resource