Bug 2276152 (CVE-2024-1681) - CVE-2024-1681 python-flask-cors: improper output neutralization for logs
Summary: CVE-2024-1681 python-flask-cors: improper output neutralization for logs
Keywords:
Status: NEW
Alias: CVE-2024-1681
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2276153 2276154
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-04-19 20:47 UTC by Robb Gatica
Modified: 2024-04-19 20:47 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2024-04-19 20:47:28 UTC
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644

Comment 1 Robb Gatica 2024-04-19 20:47:43 UTC
Created python-flask-cors tracking bugs for this issue:

Affects: epel-all [bug 2276154]
Affects: fedora-all [bug 2276153]


Note You need to log in before you can comment on or make changes to this bug.