Name | CVE-2024-6221 |
Description | A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1081300 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-flask-cors (PTS) | bullseye | 3.0.9-2 | fixed |
bullseye (security) | 3.0.9-2+deb11u1 | fixed | |
bookworm | 3.0.10-2 | fixed | |
trixie | 5.0.1-1 | fixed | |
sid | 6.0.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-flask-cors | source | bullseye | (not affected) | |||
python-flask-cors | source | bookworm | (not affected) | |||
python-flask-cors | source | (unstable) | 5.0.0-1 | 1081300 |
[bookworm] - python-flask-cors <not-affected> (Vulnerable code introduced in 3.1.01)
[bullseye] - python-flask-cors <not-affected> (Vulnerable code introduced in 3.1.01)
https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d
https://github.com/corydolphin/flask-cors/issues/337
https://github.com/advisories/GHSA-hxwh-jpp2-84pm
https://github.com/corydolphin/flask-cors/commit/7ae310c56ac30e0b94fb42129aa377bf633256ec (4.0.2)
https://github.com/corydolphin/flask-cors/commit/c8514760cf03fcce16d77f6db7007aad429c4548 (5.0.0, follow-up)