Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-PYTHON-FLASKSECURITYTOO-1293190
- published 18 May 2021
- disclosed 18 May 2021
- credit Noam Moshe of Claroty
How to fix?
Flask-Security-Too to version 4.1.0 or higher.
Affected versions of this package are vulnerable to Open Redirect. When using the
get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as
This vulnerability is only exploitable if an alternative WSGI server other than
Werkzeug is used, or the default behaviour of
Werkzeug is modified using 'autocorrect_location_header=False`.