nPinA-pi-network icon indicating copy to clipboard operation
nPinA-pi-network copied to clipboard

Flask_Cors-4.0.1-py2.py3-none-any.whl: 4 vulnerabilities (highest severity is: 7.5)

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (Flask_Cors version) Remediation Possible**
CVE-2024-6221 High 7.5 Flask_Cors-4.0.1-py2.py3-none-any.whl Direct 4.0.2
CVE-2024-6866 Medium 5.3 Flask_Cors-4.0.1-py2.py3-none-any.whl Direct N/A
CVE-2024-6844 Medium 5.3 Flask_Cors-4.0.1-py2.py3-none-any.whl Direct N/A
CVE-2024-6839 Medium 4.3 Flask_Cors-4.0.1-py2.py3-none-any.whl Direct N/A

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-6221

Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5

Found in base branch: main

Vulnerability Details

A vulnerability in corydolphin/flask-cors version 4.0.1 allows the "Access-Control-Allow-Private-Network" CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.

Publish Date: 2024-08-18

URL: CVE-2024-6221

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-hxwh-jpp2-84pm

Release Date: 2024-08-18

Fix Resolution: 4.0.2

Step up your Open Source Security Game with Mend here

CVE-2024-6866

Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5

Found in base branch: main

Vulnerability Details

corydolphin/flask-cors contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.

Publish Date: 2025-03-20

URL: CVE-2024-6866

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Step up your Open Source Security Game with Mend here

CVE-2024-6844

Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5

Found in base branch: main

Vulnerability Details

A vulnerability in corydolphin/flask-cors allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.

Publish Date: 2025-03-20

URL: CVE-2024-6844

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Step up your Open Source Security Game with Mend here

CVE-2024-6839

Vulnerable Library - Flask_Cors-4.0.1-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/8b/52/2aa6285f104616f73ee1ad7905a16b2b35af0143034ad0cf7b64bcba715c/Flask_Cors-4.0.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • :x: Flask_Cors-4.0.1-py2.py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: c24b250c4fdd4b0bb57881f5f09e59a6f6a1a3b5

Found in base branch: main

Vulnerability Details

corydolphin/flask-cors contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

Publish Date: 2025-03-20

URL: CVE-2024-6839

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Step up your Open Source Security Game with Mend here