nPinA-pi-network
nPinA-pi-network copied to clipboard
Flask_Cors-4.0.1-py2.py3-none-any.whl: 4 vulnerabilities (highest severity is: 7.5)
Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (Flask_Cors version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2024-6221 | 7.5 | Flask_Cors-4.0.1-py2.py3-none-any.whl | Direct | 4.0.2 | ❌ | |
| CVE-2024-6866 | 5.3 | Flask_Cors-4.0.1-py2.py3-none-any.whl | Direct | N/A | ❌ | |
| CVE-2024-6844 | 5.3 | Flask_Cors-4.0.1-py2.py3-none-any.whl | Direct | N/A | ❌ | |
| CVE-2024-6839 | 4.3 | Flask_Cors-4.0.1-py2.py3-none-any.whl | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-6221
Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5
Found in base branch: main
Vulnerability Details
A vulnerability in corydolphin/flask-cors version 4.0.1 allows the "Access-Control-Allow-Private-Network" CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
Publish Date: 2024-08-18
URL: CVE-2024-6221
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/advisories/GHSA-hxwh-jpp2-84pm
Release Date: 2024-08-18
Fix Resolution: 4.0.2
Step up your Open Source Security Game with Mend here
CVE-2024-6866
Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.
Publish Date: 2025-03-20
URL: CVE-2024-6866
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Step up your Open Source Security Game with Mend here
CVE-2024-6844
Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5
Found in base branch: main
Vulnerability Details
A vulnerability in corydolphin/flask-cors allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.
Publish Date: 2025-03-20
URL: CVE-2024-6844
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Step up your Open Source Security Game with Mend here
CVE-2024-6839
Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)
Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.
Publish Date: 2025-03-20
URL: CVE-2024-6839
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Step up your Open Source Security Game with Mend here