Логотип exploitDog
bind:CVE-2020-7965
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-7965

Количество 2

Количество 2

nvd логотип

CVE-2020-7965

около 6 лет назад

flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fjq3-5pxw-4wj4

почти 5 лет назад

Cross-Site Request Forgery in Webargs

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-7965

flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.

CVSS3: 8.8
0%
Низкий
около 6 лет назад
github логотип
GHSA-fjq3-5pxw-4wj4

Cross-Site Request Forgery in Webargs

CVSS3: 8.8
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу