icon

We found results for “

CVE-2024-1681

Good to know:

icon
icon

Date: April 19, 2024

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Output Neutralization for Logs

CWE-117

Top Fix

icon

Upgrade Version

Upgrade to version flask-cors - 4.0.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us