Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46780
HistoryMay 07, 2024 - 8:15 a.m.

Remote Code Execution (RCE)

2024-05-0708:15:37
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
118
rce
vulnerability
werkzeug
debugger
attacker
code execution
developer
domain
url

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.5%

werkzeug is vulnerable to Remote Code Execution. The vulnerability is due to the debugger accepting requests from non localhost locations, which allows an attacker to execute arbitrary code under specific situations. The prerequisites to this attack are the attacker must convince a developer into interacting with a domain they control, enter the debugger pin, and guess the URL within the application that triggers the debugger.

Affected configurations

Vulners
Node
veracodewerkzeugRange3.0.23.0.2
OR
veracodewerkzeugRange3.0.23.0.2
VendorProductVersionCPE
veracodewerkzeug*cpe:2.3:a:veracode:werkzeug:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0

Percentile

15.5%