| ID |
CVE-2021-23401
|
| Sažetak |
This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. |
| Reference |
|
| CVSS |
| Base: | 5.8 |
| Impact: | 4.9 |
| Exploitability: | 8.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
| Zadnje važnije ažuriranje |
08-07-2021 - 18:08 |
| Objavljeno |
05-07-2021 - 11:15 |