Lucene search

K
prionPRIOn knowledge basePRION:CVE-2021-23393
HistoryJun 11, 2021 - 12:15 a.m.

Input validation

2021-06-1100:15:00
PRIOn knowledge base
www.prio-n.com
2

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.2%

This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

CPENameOperatorVersion
flask_unchainedlt0.9.0

5.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.2%