Source: python-flask-cors
Version: 4.0.1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/corydolphin/flask-cors/issues/337
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for python-flask-cors.

CVE-2024-6221[0]:
| A vulnerability in corydolphin/flask-cors version 4.0.1 allows the
| `Access-Control-Allow-Private-Network` CORS header to be set to true
| by default, without any configuration option. This behavior can
| expose private network resources to unauthorized external access,
| leading to significant security risks such as data breaches,
| unauthorized access to sensitive information, and potential network
| intrusions.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6221
    https://www.cve.org/CVERecord?id=CVE-2024-6221
[1] https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d
[2] https://github.com/corydolphin/flask-cors/issues/337

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to