Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-1681

Опубликовано: 19 апр. 2024
Источник: debian
EPSS Низкий

Описание

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-flask-corsfixed4.0.1-1package
python-flask-corsfixed3.0.10-2+deb12u1bookwormpackage
python-flask-corspostponedbusterpackage

Примечания

  • https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644

  • https://github.com/corydolphin/flask-cors/issues/349

  • Fixed by: https://github.com/corydolphin/flask-cors/commit/6172c2000dba965fedb8e9a8a916ad56f0fb2630 (4.0.1)

EPSS

Процентиль: 36%
0.00149
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS3: 5.3
nvd
больше 1 года назад

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS3: 5.3
github
больше 1 года назад

flask-cors vulnerable to log injection when the log level is set to debug

CVSS3: 5.3
fstec
больше 1 года назад

Уязвимость фреймворка Flask, связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю изменять данные в системе

CVSS3: 6.5
redos
4 месяца назад

Множественные уязвимости python3-flask-cors

EPSS

Процентиль: 36%
0.00149
Низкий