02 Aoû 2022
Vulnérabilité CVE-2021-23385 CVE Vulnerability
This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore. (CVSS:0.0) (Last Update:2022-08-02)
Vulnerability Details : This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore. Publish Date : 2022-08-02 Last Update Date : 2022-08-02 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2021-23385
- References For CVE-2021-23385
| ||||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2021-23385There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |