CVE-2024-1681

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1681
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1681.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-1681
Aliases
Related
Published
2024-04-19T20:15:09Z
Modified
2024-09-18T03:24:50.787313Z
Summary
[none]
Details

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

References

Affected packages

Debian:11 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.9-2
3.0.10-1
3.0.10-2

4.*

4.0.0-1
4.0.1-1

5.*

5.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.10-2

4.*

4.0.0-1
4.0.1-1

5.*

5.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.1-1

Affected versions

3.*

3.0.10-2

4.*

4.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}