Remote Code Execution (RCE) Affecting werkzeug package, versions [,3.0.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-WERKZEUG-6808933
  • published6 May 2024
  • disclosed6 May 2024
  • creditRyotaK

Introduced: 6 May 2024

CVE-2024-34069  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade werkzeug to version 3.0.3 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to insufficient hostname checks and the use of relative paths to resolve requests. When the debugger is enabled, an attacker can convince a user to enter their own PIN to interact with a domain and subdomain they control, and thereby cause malicious code to be executed.

The demonstrated attack vector requires a number of conditions that render this attack very difficult to achieve, especially if the victim application is running in the recommended configuration of not having the debugger enabled in production.

CVSS Scores

version 3.1