Bug 1876698 (CVE-2020-25032)
| Summary: | CVE-2020-25032 python-flask-cors: allows ../ directory traversal to access private resources | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED WONTFIX | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | bdettelb, fzatlouk, kmullins, tomckay |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | python-flask-cors-3.0.9 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in Flask-CORS (aka CORS Middleware for Flask). This issue allows the ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. The highest threat from this vulnerability is to confidentiality.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-09-10 01:17:46 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1876699 | ||
| Bug Blocks: | 1876700 | ||
|
Description
Marian Rehak
2020-09-08 01:49:29 UTC
Created python-flask-cors tracking bugs for this issue: Affects: fedora-all [bug 1876699] While Red Hat Quay includes an affected Flask-CORS version it doesn't use resource matching to protect private resources. Therefore we rated this issue low impact for Red Hat Quay. Flask-CORS is only included in Red Hat Quay 3.1 which is in the extended life support phase. In this support phase only qualified import or critical vulnerabilities will be fixed, which this issues doesn't qualify as. https://access.redhat.com/support/policy/updates/rhquay This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25032 External References: https://github.com/corydolphin/flask-cors/releases/tag/3.0.9 Statement: Red Hat Quay includes Flask-CORS but does not use the vulnerable resource matching functionality. Therefore this issue is rated as low impact for Red Hat Quay. |