Описание
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 6.0.1-1 |
| esm-apps/focal | released | 3.0.8-2ubuntu0.1+esm1 |
| esm-apps/jammy | released | 3.0.9-2ubuntu0.1 |
| esm-apps/noble | released | 4.0.0-1ubuntu0.1~esm1 |
| focal | ignored | end of standard support, was needs-triage |
| jammy | released | 3.0.9-2ubuntu0.1 |
| mantic | ignored | end of life, was needs-triage |
| noble | needed | |
| oracular | not-affected | 4.0.1-1 |
| plucky | not-affected | 5.0.0-1 |
Показывать по
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
corydolphin/flask-cors is vulnerable to log injection when the log lev ...
flask-cors vulnerable to log injection when the log level is set to debug
Уязвимость фреймворка Flask, связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю изменять данные в системе
EPSS
5.3 Medium
CVSS3