Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qOGZxLTg2YzUtNXYycs0WvA

Remote code execution in dask

An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.

Permalink: https://github.com/advisories/GHSA-j8fq-86c5-5v2r
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qOGZxLTg2YzUtNXYycs0WvA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 9 months ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-j8fq-86c5-5v2r, CVE-2021-42343
References: Repository: https://github.com/dask/distributed
Blast Radius: 37.9

Affected Packages

pypi:distributed
Dependent packages: 307
Dependent repositories: 7,307
Downloads: 3,767,613 last month
Affected Version Ranges: < 2021.10.0
Fixed in: 2021.10.0
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.4.0, 1.5.0, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.12.0, 1.12.1, 1.12.2, 1.13.0, 1.13.1, 1.13.2, 1.13.3, 1.14.0, 1.14.1, 1.14.3, 1.15.0, 1.15.1, 1.15.2, 1.16.0, 1.16.1, 1.16.2, 1.16.3, 1.17.0, 1.17.1, 1.18.0, 1.18.1, 1.18.2, 1.18.3, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.20.0, 1.20.1, 1.20.2, 1.21.0, 1.21.1, 1.21.2, 1.21.3, 1.21.4, 1.21.5, 1.21.6, 1.21.7, 1.21.8, 1.22.0, 1.22.1, 1.23.0, 1.23.1, 1.23.2, 1.23.3, 1.24.0, 1.24.1, 1.24.2, 1.25.0, 1.25.1, 1.25.2, 1.25.3, 1.26.0, 1.26.1, 1.27.0, 1.27.1, 1.28.0, 1.28.1, 2.0.1, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.7.0, 2.8.0, 2.8.1, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.10.0, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.15.0, 2.15.1, 2.15.2, 2.16.0, 2.17.0, 2.18.0, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, 2.25.0, 2.26.0, 2.27.0, 2.28.0, 2.29.0, 2.30.0, 2.30.1, 2020.12.0, 2021.1.0, 2021.1.1, 2021.2.0, 2021.3.0, 2021.3.1, 2021.4.0, 2021.4.1, 2021.5.0, 2021.5.1, 2021.6.0, 2021.6.1, 2021.6.2, 2021.7.0, 2021.7.1, 2021.7.2, 2021.8.0, 2021.8.1, 2021.9.0, 2021.9.1
All unaffected versions: 2021.10.0, 2021.11.0, 2021.11.1, 2021.11.2, 2021.12.0, 2022.1.0, 2022.1.1, 2022.2.0, 2022.2.1, 2022.3.0, 2022.4.0, 2022.4.1, 2022.4.2, 2022.5.0, 2022.5.1, 2022.5.2, 2022.6.0, 2022.6.1, 2022.7.0, 2022.7.1, 2022.8.0, 2022.8.1, 2022.9.0, 2022.9.1, 2022.9.2, 2022.10.0, 2022.10.1, 2022.10.2, 2022.11.0, 2022.11.1, 2022.12.0, 2022.12.1, 2023.1.0, 2023.1.1, 2023.2.0, 2023.2.1, 2023.3.0, 2023.3.1, 2023.3.2, 2023.4.0, 2023.4.1, 2023.5.0, 2023.5.1, 2023.6.0, 2023.6.1, 2023.7.0, 2023.7.1, 2023.8.0, 2023.8.1, 2023.9.0, 2023.9.1, 2023.9.2, 2023.9.3, 2023.10.0, 2023.10.1, 2023.11.0, 2023.12.0, 2023.12.1, 2024.1.0, 2024.1.1, 2024.2.0, 2024.2.1, 2024.3.0, 2024.3.1, 2024.4.0, 2024.4.1, 2024.4.2, 2024.5.0