Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-34069

Опубликовано: 06 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

РелизСтатусПримечание
devel

not-affected

3.0.3-1
esm-infra/bionic

released

0.14.1+dfsg1-1ubuntu0.2+esm1
esm-infra/focal

not-affected

0.16.1+dfsg1-2ubuntu0.2
esm-infra/xenial

released

0.10.4+dfsg1-1ubuntu1.2+esm2
focal

released

0.16.1+dfsg1-2ubuntu0.2
jammy

released

2.0.2+dfsg1-1ubuntu0.22.04.2
mantic

released

2.2.2-3ubuntu0.1
noble

released

3.0.1-3ubuntu0.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 37%
0.00156
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
nvd
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

CVSS3: 7.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
около 1 года назад

Werkzeug is a comprehensive WSGI web application library. The debugger ...

suse-cvrf
около 1 года назад

Security update for python-Werkzeug

EPSS

Процентиль: 37%
0.00156
Низкий

7.5 High

CVSS3