Lucene search

K
prionPRIOn knowledge basePRION:CVE-2021-23401
HistoryJul 05, 2021 - 11:15 a.m.

Input validation

2021-07-0511:15:00
PRIOn knowledge base
www.prio-n.com
3

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%

This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%