Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-23385
HistoryAug 02, 2022 - 12:00 a.m.

CVE-2021-23385

2022-08-0200:00:00
ubuntu.com
ubuntu.com
13

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

36.7%

This affects all versions of package Flask-Security. When using the
get_post_logout_redirect and get_post_login_redirect functions, it is
possible to bypass URL validation and redirect a user to an arbitrary URL
by providing multiple back slashes such as \\evil.com/path. This
vulnerability is only exploitable if an alternative WSGI server other than
Werkzeug is used, or the default behaviour of Werkzeug is modified using
'autocorrect_location_header=False. Note: Flask-Security is not
maintained anymore.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchflask-security< 1.7.5-2ubuntu0.18.04.1~esm1UNKNOWN
ubuntu20.04noarchflask-security< 1.7.5-2ubuntu0.20.04.1UNKNOWN
ubuntu22.04noarchflask-security< 4.0.0-1ubuntu0.1UNKNOWN

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

36.7%