Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-34069

Опубликовано: 06 мая 2024
Источник: redhat
CVSS3: 7.5

Описание

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

A flaw was found in Werkzeug, where an attacker may be able to execute code on a developer's machine under some circumstances. This issue requires the attacker to get the developer to interact with a domain and subdomain they control and enter the debugger PIN; if they are successful, it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger.

Отчет

Werkzeug's debugger allows an attacker to potentially execute code on a developer's machine. This can occur if the attacker tricks the developer into interacting with a controlled domain and subdomain and entering the debugger PIN. Although the debugger is meant to run locally, successful exploitation can give the attacker access to it by guessing a specific URL that triggers the debugger. The severity is rate as IMPORTANT because this flaw can potentially impacts confidentiality, integrity, and availability if the attacker can gain control. Ceph uses an affected Werkzeug version but this vulnerability does not impact OpenShift Data Foundation (ODF) because the debugger is not set up or used on development machines, so there is no debugger to have information taken from.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 5python-werkzeugAffected
Red Hat Ceph Storage 6python-werkzeugAffected
Red Hat Enterprise Linux 7python-werkzeugOut of support scope
Red Hat Enterprise Linux 8python-werkzeugWill not fix
Red Hat OpenStack Platform 16.1python-werkzeugOut of support scope
Red Hat OpenStack Platform 16.2openstack-designateWill not fix
Red Hat OpenStack Platform 18.0python-httpcoreAffected
Red Hat OpenStack Platform 18.0python-werkzeugAffected
Red Hat Quay 3quay/quay-rhel8Affected
Red Hat Storage 3python-werkzeugOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=2279451python-werkzeug: user may execute code on a developer's machine

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
nvd
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger ...

suse-cvrf
около 1 года назад

Security update for python-Werkzeug

7.5 High

CVSS3