Remote Code Execution (RCE) Affecting werkzeug package, versions [,3.0.3)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-WERKZEUG-6808933
- published 6 May 2024
- disclosed 6 May 2024
- credit RyotaK
Introduced: 6 May 2024
CVE-2024-34069 Open this link in a new tabHow to fix?
Upgrade werkzeug
to version 3.0.3 or higher.
Overview
Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to insufficient hostname checks and the use of relative paths to resolve requests. When the debugger is enabled, an attacker can convince a user to enter their own PIN to interact with a domain and subdomain they control, and thereby cause malicious code to be executed.
The demonstrated attack vector requires a number of conditions that render this attack very difficult to achieve, especially if the victim application is running in the recommended configuration of not having the debugger enabled in production.