Skip to content

Flask_Cors-4.0.0-py2.py3-none-any.whl: 4 vulnerabilities (highest severity is: 5.3) #7

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl

Path to dependency file: /Pipfile

Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (Flask_Cors version) Remediation Possible**
CVE-2024-6866 Medium 5.3 Flask_Cors-4.0.0-py2.py3-none-any.whl Direct flask-cors - 6.0.0
CVE-2024-6844 Medium 5.3 Flask_Cors-4.0.0-py2.py3-none-any.whl Direct flask-cors - 6.0.0
CVE-2024-1681 Medium 5.3 Flask_Cors-4.0.0-py2.py3-none-any.whl Direct flask-cors - 4.0.1
CVE-2024-6839 Medium 4.3 Flask_Cors-4.0.0-py2.py3-none-any.whl Direct flask-cors - 6.0.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-6866

Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl

Path to dependency file: /Pipfile

Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors

Dependency Hierarchy:

  • Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

corydolphin/flask-cors contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.

Publish Date: 2025-03-20

URL: CVE-2024-6866

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-43qf-4rqw-9q2g

Release Date: 2025-03-20

Fix Resolution: flask-cors - 6.0.0

Step up your Open Source Security Game with Mend here

CVE-2024-6844

Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl

Path to dependency file: /Pipfile

Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors

Dependency Hierarchy:

  • Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

A vulnerability in corydolphin/flask-cors allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.

Publish Date: 2025-03-20

URL: CVE-2024-6844

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-8vgw-p6qm-5gr7

Release Date: 2025-03-20

Fix Resolution: flask-cors - 6.0.0

Step up your Open Source Security Game with Mend here

CVE-2024-1681

Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl

Path to dependency file: /Pipfile

Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors

Dependency Hierarchy:

  • Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

Publish Date: 2024-04-19

URL: CVE-2024-1681

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-84pr-m4jr-85g5

Release Date: 2024-04-19

Fix Resolution: flask-cors - 4.0.1

Step up your Open Source Security Game with Mend here

CVE-2024-6839

Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl

A Flask extension adding a decorator for CORS support

Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl

Path to dependency file: /Pipfile

Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors

Dependency Hierarchy:

  • Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

corydolphin/flask-cors contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

Publish Date: 2025-03-20

URL: CVE-2024-6839

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-7rxf-gvfg-47g4

Release Date: 2025-03-20

Fix Resolution: flask-cors - 6.0.0

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions