6.0.1.dev0
11 years ago
24 days ago
Known vulnerabilities in the flask-cors package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Flask-Cors is an A Flask extension adding a decorator for CORS support Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity in the How to fix Improper Handling of Case Sensitivity? Upgrade | [,6.0.0) |
Flask-Cors is an A Flask extension adding a decorator for CORS support Affected versions of this package are vulnerable to Improper Verification of Source of a Communication Channel due to improper application of regex path matching rules. An attacker can gain unauthorized cross-origin access to sensitive data or functionality by exploiting the prioritization of longer regex patterns over more specific ones, leading to less restrictive CORS policies being applied to sensitive endpoints. Note: An initial attempt to fix the vulnerability was included in 6.0.0 but it was proved to be incomplete. PR 392 fully addresses the issue. How to fix Improper Verification of Source of a Communication Channel? Upgrade | [,6.0.0) |
Flask-Cors is an A Flask extension adding a decorator for CORS support Affected versions of this package are vulnerable to Log Injection when the log level is set to debug. A user can inject or modify messages by abusing CRLF sequences in the request path of a GET request. How to fix Log Injection? Upgrade | [,4.0.1) |
Flask-Cors is an A Flask extension adding a decorator for CORS support Affected versions of this package are vulnerable to Directory Traversal. An attacker could potentially access private resources because resource matching does not ensure that pathnames are in a canonical format. How to fix Directory Traversal? Upgrade | [,3.0.9) |