• CVE-2024-1681

发布时间: 2024年6月14日

修改时间: 2024年10月31日

概要

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS v3 指标

NVD openEuler
Confidentiality None
Attack Vector Network
CVSS评分 N/A 5.3
Attack Complexity Low
Privileges Required None
Scope Unchanged
Integrity Low
User Interaction None
Availability None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-2645 corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs. 2024年6月7日
KylinSec-SA-2024-4958 python-Flask-Cors security update 2025年2月17日

影响产品

产品 状态
V6 python-Flask-Cors Fixed