CVE-2024-6221

NameCVE-2024-6221
DescriptionA vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1081300

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-flask-cors (PTS)bullseye3.0.9-2vulnerable
bookworm3.0.10-2vulnerable
sid, trixie5.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-flask-corssource(unstable)5.0.0-11081300

Notes

[bookworm] - python-flask-cors <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - python-flask-cors <postponed> (Minor issue)
https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d
https://github.com/corydolphin/flask-cors/issues/337
https://github.com/advisories/GHSA-hxwh-jpp2-84pm
https://github.com/corydolphin/flask-cors/commit/7ae310c56ac30e0b94fb42129aa377bf633256ec (4.0.2)

Search for package or bug name: Reporting problems