CVE-2024-1681

April 19, 2024, 8:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Flask-CORS

Source

security@huntr.dev

Tags

CVE-2024-1681 details

Published : April 19, 2024, 8:15 p.m.
Last Modified : April 19, 2024, 8:15 p.m.

Description

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS Score

1 2 3 4 5.3 6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

Base Score

5.3

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644 security@huntr.dev
This website uses the NVD API, but is not approved or certified by it.