NA

CVE-2024-1681

Published: 19/04/2024 Updated: 22/04/2024

Vulnerability Summary

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows malicious users to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

Vendor Advisories

Debian Bug report logs - #1069764 python-flask-cors: CVE-2024-1681 Package: src:python-flask-cors; Maintainer for src:python-flask-cors is Debian Python Team <team+python@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 24 Apr 2024 11:45:06 UTC Severity: important Tags: security, upstr ...