Medium CVSS 6.6

Overview

Local File Inclusion in dagster._grpc.impl.get_notebook_data in Dagster 1.10.14 allows attackers with access to the gRPC server to read arbitrary files by supplying path traversal sequences in the notebook_path field of ExternalNotebookData requests, bypassing the intended extension-based check.

Risk analysis

This vulnerability is rated 🟡 MEDIUM.

  • CVSS: 6.6 (MEDIUM)
  • Detected tags: lfi, path (tag impact: MODERATE)

Recommended actions:

  • Normalize paths, use allowlists; block user-controlled file paths.
  • Canonicalize path; block `..` traversal; use allowlists.

Recommended tools

Tags