Products
Flask-CORS
Source
security@huntr.dev
Tags
CVE-2024-1681 details
Published : April 19, 2024, 8:15 p.m.
Last Modified : April 19, 2024, 8:15 p.m.
Last Modified : April 19, 2024, 8:15 p.m.
Description
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
CVSS Score
1 | 2 | 3 | 4 | 5.3 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
5.3
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
References
URL | Source |
---|---|
https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644 | security@huntr.dev |
This website uses the NVD API, but is not approved or certified by it.