Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Vulnerabilities
| Vulnerability |
Severity |
CVSS |
Dependency |
Type |
Fixed in (Flask_Cors version) |
Remediation Possible** |
| CVE-2024-6866 |
Medium |
5.3 |
Flask_Cors-4.0.0-py2.py3-none-any.whl |
Direct |
flask-cors - 6.0.0 |
❌ |
| CVE-2024-6844 |
Medium |
5.3 |
Flask_Cors-4.0.0-py2.py3-none-any.whl |
Direct |
flask-cors - 6.0.0 |
❌ |
| CVE-2024-1681 |
Medium |
5.3 |
Flask_Cors-4.0.0-py2.py3-none-any.whl |
Direct |
flask-cors - 4.0.1 |
❌ |
| CVE-2024-6839 |
Medium |
4.3 |
Flask_Cors-4.0.0-py2.py3-none-any.whl |
Direct |
flask-cors - 6.0.0 |
❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-6866
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
- ❌ Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.
Publish Date: 2025-03-20
URL: CVE-2024-6866
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-43qf-4rqw-9q2g
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here
CVE-2024-6844
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
- ❌ Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A vulnerability in corydolphin/flask-cors allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.
Publish Date: 2025-03-20
URL: CVE-2024-6844
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-8vgw-p6qm-5gr7
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here
CVE-2024-1681
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
- ❌ Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
Publish Date: 2024-04-19
URL: CVE-2024-1681
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-84pr-m4jr-85g5
Release Date: 2024-04-19
Fix Resolution: flask-cors - 4.0.1
Step up your Open Source Security Game with Mend here
CVE-2024-6839
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
- ❌ Flask_Cors-4.0.0-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.
Publish Date: 2025-03-20
URL: CVE-2024-6839
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-7rxf-gvfg-47g4
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains a vulnerability where the request path matching is case-insensitive due to the use of the
try_matchfunction, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.Publish Date: 2025-03-20
URL: CVE-2024-6866
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-43qf-4rqw-9q2g
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A vulnerability in corydolphin/flask-cors allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.
Publish Date: 2025-03-20
URL: CVE-2024-6844
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-8vgw-p6qm-5gr7
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
Publish Date: 2024-04-19
URL: CVE-2024-1681
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-84pr-m4jr-85g5
Release Date: 2024-04-19
Fix Resolution: flask-cors - 4.0.1
Step up your Open Source Security Game with Mend here
Vulnerable Library - Flask_Cors-4.0.0-py2.py3-none-any.whl
A Flask extension adding a decorator for CORS support
Library home page: https://files.pythonhosted.org/packages/10/69/1e6cfb87117568a9de088c32d6258219e9d1ff7c131abf74249ef2031279/Flask_Cors-4.0.0-py2.py3-none-any.whl
Path to dependency file: /Pipfile
Path to vulnerable library: /tmp/containerbase/cache/.local/share/virtualenvs/reactresolve-_UixkESs/lib/python3.8/site-packages/flask_cors
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
corydolphin/flask-cors contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.
Publish Date: 2025-03-20
URL: CVE-2024-6839
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-7rxf-gvfg-47g4
Release Date: 2025-03-20
Fix Resolution: flask-cors - 6.0.0
Step up your Open Source Security Game with Mend here