Improper Output Neutralization for Logs Affecting py3-flask-cors package, versions <4.0.1-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Output Neutralization for Logs vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-PY3FLASKCORS-6809351
  • published6 May 2024
  • disclosed19 Apr 2024

Introduced: 19 Apr 2024

CVE-2024-1681  (opens in a new tab)
CWE-117  (opens in a new tab)

How to fix?

Upgrade Wolfi py3-flask-cors to version 4.0.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream py3-flask-cors package and not the py3-flask-cors package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.