Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-99pm-ch96-ccp2

Опубликовано: 16 мая 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Flask-AppBuilder open redirect vulnerability using HTTP host injection

Impact

Flask-AppBuilder prior to 4.6.2 would allow for a malicious unauthenticated actor to perform an open redirect by manipulating the Host header in HTTP requests.

Patches

Flask-AppBuilder 4.6.2 introduced the FAB_SAFE_REDIRECT_HOSTS configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection.

Examples:

FAB_SAFE_REDIRECT_HOSTS = ["yourdomain.com", "sub.yourdomain.com", "*.yourcompany.com"]

Workarounds

Use a Reverse Proxy to Enforce Trusted Host Headers

References

Are there any links users can visit to find out more?

Пакеты

Наименование

flask-appbuilder

pip
Затронутые версииВерсия исправления

< 4.6.2

4.6.2

EPSS

Процентиль: 9%
0.00033
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.3
nvd
9 месяцев назад

Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 4.6.2 would allow for a malicious unauthenticated actor to perform an open redirect by manipulating the Host header in HTTP requests. Flask-AppBuilder 4.6.2 introduced the `FAB_SAFE_REDIRECT_HOSTS` configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection. As a workaround, use a reverse proxy to enforce trusted host headers.

CVSS3: 4.3
debian
9 месяцев назад

Flask-AppBuilder is an application development framework built on top ...

EPSS

Процентиль: 9%
0.00033
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-601