Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. docassemble.webapp
  4. ›
  5. CVE-2024-27292

CVE-2024-27292: Docassemble unauthorized access through URL manipulation

February 29, 2024

Impact

The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96.

Patches

The vulnerability has been patched in version 1.4.97 of the master branch. The Docker image on docker.io has been patched.

Workarounds

If upgrading is not possible, manually apply the changes of 97f77dc and restart the server.

Credit

The vulnerability was discovered by Riyush Ghimire (@richighimi).

For more information

If you have any questions or comments about this advisory:

  • Open an issue in docassemble
  • Join the Slack channel
  • Email us at jhpyle@gmail.com

References

  • github.com/advisories/GHSA-jq57-3w7p-vwvv
  • github.com/jhpyle/docassemble
  • github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
  • github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
  • nvd.nist.gov/vuln/detail/CVE-2024-27292

Code Behaviors & Features

Detect and mitigate CVE-2024-27292 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.4.53 before 1.4.97

Fixed versions

  • 1.4.97

Solution

Upgrade to version 1.4.97 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Source file

pypi/docassemble.webapp/CVE-2024-27292.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:16 +0000.