CVE-2024-3408

CRITICAL EXPLOITED NUCLEI

D-Tale RCE

Title source: metasploit

Description

man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.

Exploits (2)

nomisec WORKING POC
by flame-11 · remote
https://github.com/flame-11/CVE-2024-3408-dtale
metasploit WORKING POC EXCELLENT
by taiphung217, Takahiro Yokoyama · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dtale_rce_cve_2025_0655.rb

Nuclei Templates (1)

D-Tale 3.10.0 - 3.15.1 - Authentication Bypass & Remote Code Execution
CRITICALVERIFIEDby ohmygod20260203
Shodan: title:"D-Tale"
FOFA: title="D-Tale"

Scores

CVSS v3 9.8
EPSS 0.9130
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-12-19
CWE
CWE-94 CWE-798
Status published
Products (2)
man/d-tale 3.10.0
pypi/dtale 0PyPI
Published Jun 06, 2024
Tracked Since Feb 18, 2026