Lucene search

K
vulnrichment@huntr_aiVULNRICHMENT:CVE-2024-1681
HistoryApr 19, 2024 - 7:37 p.m.

CVE-2024-1681 Log Injection Vulnerability in corydolphin/flask-cors

2024-04-1919:37:27
CWE-117
@huntr_ai
github.com
3
corydolphin/flask-cors
log injection
vulnerability
cve-2024-1681
get request
log file
attackers
output neutralization

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:corydolphin:flask-cors:-:*:*:*:*:*:*:*"
    ],
    "vendor": "corydolphin",
    "product": "flask-cors",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial