Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-23385

Опубликовано: 02 авг. 2022
Источник: ubuntu
Приоритет: medium
CVSS3: 5.4

Описание

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. Note: Flask-Security is not maintained anymore.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

4.0.0-1+deb11u1
esm-apps/bionic

released

1.7.5-2ubuntu0.18.04.1~esm1
esm-apps/focal

released

1.7.5-2ubuntu0.20.04.1
esm-apps/jammy

released

4.0.0-1ubuntu0.1
esm-apps/noble

not-affected

4.0.0-1+deb11u1
esm-infra-legacy/trusty

DNE

focal

released

1.7.5-2ubuntu0.20.04.1
groovy

ignored

end of life
hirsute

ignored

end of life

Показывать по

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
больше 3 лет назад

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

CVSS3: 5.4
debian
больше 3 лет назад

This affects all versions of package Flask-Security. When using the ge ...

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security-Too

suse-cvrf
больше 3 лет назад

Security update for python-Flask-Security

CVSS3: 6.1
github
больше 3 лет назад

Flask-Security vulnerable to Open Redirect

5.4 Medium

CVSS3