Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-23385

Опубликовано: 02 авг. 2022
Источник: debian
EPSS Низкий

Описание

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
flask-securityfixed5.0.2-1package
flask-securityfixed4.0.0-1+deb11u1bullseyepackage

Примечания

  • https://security.snyk.io/vuln/SNYK-PYTHON-FLASKSECURITY-1293234

  • https://github.com/Flask-Middleware/flask-security/issues/724

  • https://github.com/Flask-Middleware/flask-security/issues/486

  • https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c

  • https://github.com/Flask-Middleware/flask-security/commit/e39bb04615050448c1b8ba4caa7dacc0edd3e405 (4.1.0)

EPSS

Процентиль: 38%
0.00164
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 3 лет назад

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

CVSS3: 5.4
nvd
больше 3 лет назад

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security-Too

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security

CVSS3: 6.1
github
больше 3 лет назад

Flask-Security vulnerable to Open Redirect

EPSS

Процентиль: 38%
0.00164
Низкий