• CVE-2024-1681

发布时间: 2024年6月7日

修改时间: 2024年7月2日

概要

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

CVSS v3 指标

NVD openEuler
CVSS评分 5.3 5.3
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality None None
Integrity Low Low
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-2645 corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs. 2024年6月7日
KylinSec-SA-2024-4958 python-Flask-Cors security update 2024年6月14日

影响产品

产品 状态
KY3.4-5A python-Flask-Cors Unaffected
KY3.5.2 python-Flask-Cors Unaffected
V6 python-Flask-Cors Fixed