Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-43B7F9A60A7397598F3C75DD896477D0
HistoryJun 22, 2023 - 12:00 a.m.

Generation of Error Message Containing Sensitive Information

2023-06-2200:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
8
error message
sensitive information
authorization bypass
database error
security fix
flask-appbuilder

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

38.0%

Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.

Affected configurations

Vulners
Node
pypiml-scannerRange<4.3.2pypi
CPENameOperatorVersion
pypi/flask-appbuilderlt4.3.2

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

38.0%

Related for GITLAB-43B7F9A60A7397598F3C75DD896477D0