Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-23385

Опубликовано: 02 авг. 2022
Источник: nvd
CVSS3: 5.4
CVSS3: 6.1
EPSS Низкий

Описание

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. Note: Flask-Security is not maintained anymore.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:flask-security_project:flask-security:*:*:*:*:*:*:*:*

EPSS

Процентиль: 38%
0.00164
Низкий

5.4 Medium

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 3 лет назад

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

CVSS3: 5.4
debian
больше 3 лет назад

This affects all versions of package Flask-Security. When using the ge ...

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security-Too

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security

CVSS3: 6.1
github
больше 3 лет назад

Flask-Security vulnerable to Open Redirect

EPSS

Процентиль: 38%
0.00164
Низкий

5.4 Medium

CVSS3

6.1 Medium

CVSS3

Дефекты

CWE-601