• CVE-2024-1681

发布时间: 2024年6月14日

修改时间: 2024年10月31日

概要

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Network
CVSS评分 5.3 5.3
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity Low Low
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-2645 corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs. 2024年6月7日
KylinSec-SA-2024-4958 python-Flask-Cors security update 2025年2月17日

影响产品

产品 状态
V6 python-Flask-Cors Fixed