Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-45314
HistorySep 04, 2024 - 4:08 p.m.

CVE-2024-45314 Flask-AppBuilder login form allows browser to cache sensitive fields

2024-09-0416:08:41
CWE-525
GitHub_M
github.com
flask-appbuilder
security issue
browser caching
sensitive data
patch
upgrade
web server configuration
http headers
github security advisory

CVSS3

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

21.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Flask-AppBuilder is an application development framework. Prior to version 4.5.1, the auth DB login form default cache directives allows browser to locally store sensitive data. This can be an issue on environments using shared computer resources. Version 4.5.1 contains a patch for this issue. If upgrading is not possible, configure one’s web server to send the specific HTTP headers for /login per the directions provided in the GitHub Security Advisory.

CVSS3

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

21.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-45314