Source: python-flask-cors
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for python-flask-cors.

CVE-2024-6866[0]:
| corydolphin/flask-cors version 4.01 contains a vulnerability where
| the request path matching is case-insensitive due to the use of the
| `try_match` function, which is originally intended for matching
| hosts. This results in a mismatch because paths in URLs are case-
| sensitive, but the regex matching treats them as case-insensitive.
| This misconfiguration can lead to significant security
| vulnerabilities, allowing unauthorized origins to access paths meant
| to be restricted, resulting in data exposure and potential data
| leaks.

https://huntr.com/bounties/808c11af-faee-43a8-824b-b5ab4f62b9e6


CVE-2024-6844[1]:
| A vulnerability in corydolphin/flask-cors version 4.0.1 allows for
| inconsistent CORS matching due to the handling of the '+' character
| in URL paths. The request.path is passed through the unquote_plus
| function, which converts the '+' character to a space ' '. This
| behavior leads to incorrect path normalization, causing potential
| mismatches in CORS configuration. As a result, endpoints may not be
| matched correctly to their CORS settings, leading to unexpected CORS
| policy application. This can cause unauthorized cross-origin access
| or block valid requests, creating security vulnerabilities and
| usability issues.

https://huntr.com/bounties/731a6cd4-d05f-4fe6-8f5b-fe088d7b34e0


CVE-2024-6839[2]:
| corydolphin/flask-cors version 4.0.1 contains an improper regex path
| matching vulnerability. The plugin prioritizes longer regex patterns
| over more specific ones when matching paths, which can lead to less
| restrictive CORS policies being applied to sensitive endpoints. This
| mismatch in regex pattern priority allows unauthorized cross-origin
| access to sensitive data or functionality, potentially exposing
| confidential information and increasing the risk of unauthorized
| actions by malicious actors.

https://huntr.com/bounties/403eb1fc-86f4-4820-8eba-0f3dfae9f2b4



If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6866
    https://www.cve.org/CVERecord?id=CVE-2024-6866
[1] https://security-tracker.debian.org/tracker/CVE-2024-6844
    https://www.cve.org/CVERecord?id=CVE-2024-6844
[2] https://security-tracker.debian.org/tracker/CVE-2024-6839
    https://www.cve.org/CVERecord?id=CVE-2024-6839

Please adjust the affected versions in the BTS as needed.

Reply via email to