Bug 2353548 (CVE-2024-6844) - CVE-2024-6844 flask-cors: Inconsistent CORS Matching Due to Handling of '+' in URL Path in corydolphin/flask-cors
Summary: CVE-2024-6844 flask-cors: Inconsistent CORS Matching Due to Handling of '+' i...
Keywords:
Status: NEW
Alias: CVE-2024-6844
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-20 11:01 UTC by OSIDB Bzimport
Modified: 2025-03-20 15:52 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-20 11:01:47 UTC
A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.


Note You need to log in before you can comment on or make changes to this bug.