Insufficient Randomness Affecting werkzeug package, versions [,0.12)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-WERKZEUG-564338
  • published 3 Apr 2020
  • disclosed 4 Aug 2015
  • credit Unknown

Introduced: 4 Aug 2015

CVE NOT AVAILABLE CWE-310 Open this link in a new tab

How to fix?

Upgrade Werkzeug to version 0.12 or higher.

Overview

Werkzeug is a WSGI web application library.

Affected versions of this package are vulnerable to Insufficient Randomness. SHA1 hash algorithm is used with 1000 rounds for hashing. This deviates from security best practice.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
2.9 low
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None