Lucene search

K
githubGitHub Advisory DatabaseGHSA-32FF-4G79-VGFC
HistoryJul 29, 2022 - 10:28 p.m.

Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings

2022-07-2922:28:12
CWE-200
CWE-916
GitHub Advisory Database
github.com
19
flask-appbuilder
sensitive information
query strings
authentication
security patch

CVSS3

2.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

19.4%

Impact

An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users.

Only when using AUTH_DB database authentication option.

Patches

Fixed on 4.1.3

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
flask-appbuilder_projectflask-appbuilderRange<4.1.3
VendorProductVersionCPE
flask-appbuilder_projectflask-appbuilder*cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:*

CVSS3

2.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

19.4%