Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk:Low] Flask-cors Log Injection LOCUST (Due: 07/23/2024) #5807

Open
cnlucas opened this issue Apr 24, 2024 · 0 comments
Open

[Snyk:Low] Flask-cors Log Injection LOCUST (Due: 07/23/2024) #5807

cnlucas opened this issue Apr 24, 2024 · 0 comments
Labels
Security: general General security concern or issue Security: low Remediate within 90 days
Milestone

Comments

@cnlucas
Copy link
Member

cnlucas commented Apr 24, 2024

Introduced through
locust@2.14.2

Exploit maturity
Proof of Concept

Detailed paths

Introduced through: project@0.0.0 › locust@2.14.2 › flask-cors@4.0.0
Fix: No remediation path available. 

Security information
Factors contributing to the scoring:

Snyk: [CVSS 3.1](https://security.snyk.io/vuln/SNYK-PYTHON-FLASKCORS-6670412) - Low Severity
NVD: Not available. NVD has not yet published its analysis.

Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview

Flask-Cors is an A Flask extension adding a decorator for CORS support

Affected versions of this package are vulnerable to Log Injection when the log level is set to debug. A user can inject or modify messages by abusing CRLF sequences in the request path of a GET request.

@cnlucas cnlucas added Security: low Remediate within 90 days Security: general General security concern or issue labels Apr 24, 2024
@cnlucas cnlucas added this to the 25.5 milestone Apr 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: general General security concern or issue Security: low Remediate within 90 days
Projects
Status: No status
Development

No branches or pull requests

1 participant