6.1
CVSSv3

CVE-2021-23385

Published: 02/08/2022 Updated: 28/08/2023
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

flask-security project flask-security

Vendor Advisories

Debian Bug report logs - #1021279 flask-security: CVE-2021-23385 Package: src:flask-security; Maintainer for src:flask-security is Debian Python Team <team+python@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Tue, 4 Oct 2022 19:57:04 UTC Severity: important Tags: security, upstream ...