Improper Input Validation Affecting python-werkzeug package, versions <0.14.1+dfsg1-4+deb10u2


Severity

Recommended
0.0
low
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-PYTHONWERKZEUG-3320616
  • published15 Feb 2023
  • disclosed14 Feb 2023

Introduced: 14 Feb 2023

CVE-2023-23934  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:10 python-werkzeug to version 0.14.1+dfsg1-4+deb10u2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-werkzeug package and not the python-werkzeug package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like =value instead of key=value. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like =__Host-test=bad for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie =__Host-test=bad as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.

CVSS Scores

version 3.1