All the vulnerabilites related to corydolphin - corydolphin/flask-cors
cve-2024-6221
Vulnerability from cvelistv5
Published
2024-08-18 18:58
Modified
2024-08-19 13:48
Severity ?
EPSS score ?
Summary
Improper Access Control in corydolphin/flask-cors
References
Impacted products
▼ | Vendor | Product |
---|---|---|
corydolphin | corydolphin/flask-cors |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:corydolphin:flask-cors:4.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "flask-cors", "vendor": "corydolphin", "versions": [ { "lessThan": "*", "status": "affected", "version": "4.0.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6221", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T13:46:09.049560Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-19T13:48:13.411Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "corydolphin/flask-cors", "vendor": "corydolphin", "versions": [ { "lessThanOrEqual": "latest", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-18T18:58:20.551Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d" } ], "source": { "advisory": "a42935fc-6f57-4818-bca4-3d528235df4d", "discovery": "EXTERNAL" }, "title": "Improper Access Control in corydolphin/flask-cors" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-6221", "datePublished": "2024-08-18T18:58:20.551Z", "dateReserved": "2024-06-20T18:32:12.417Z", "dateUpdated": "2024-08-19T13:48:13.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1681
Vulnerability from cvelistv5
Published
2024-04-19 19:37
Modified
2024-08-01 18:48
Severity ?
EPSS score ?
Summary
Log Injection Vulnerability in corydolphin/flask-cors
References
Impacted products
▼ | Vendor | Product |
---|---|---|
corydolphin | corydolphin/flask-cors |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:corydolphin:flask-cors:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "flask-cors", "vendor": "corydolphin", "versions": [ { "status": "affected", "version": "-" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1681", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T20:21:15.891893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:00:45.486Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:48:21.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "corydolphin/flask-cors", "vendor": "corydolphin", "versions": [ { "lessThanOrEqual": "latest", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-117", "description": "CWE-117 Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-19T19:37:27.998Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644" } ], "source": { "advisory": "25a7a0ba-9fa2-4777-acb6-03e5539bb644", "discovery": "EXTERNAL" }, "title": "Log Injection Vulnerability in corydolphin/flask-cors" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntr_ai", "cveId": "CVE-2024-1681", "datePublished": "2024-04-19T19:37:27.998Z", "dateReserved": "2024-02-20T19:13:22.208Z", "dateUpdated": "2024-08-01T18:48:21.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }