A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
References
Link | Resource |
---|---|
https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d | Exploit Third Party Advisory |
Configurations
History
20 Aug 2024, 19:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:corydolphin:flask-cors:4.0.1:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Corydolphin
Corydolphin flask-cors |
|
References | () https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d - Exploit, Third Party Advisory |
19 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Aug 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-18 19:15
Updated : 2024-08-20 19:37
NVD link : CVE-2024-6221
Mitre link : CVE-2024-6221
CVE.ORG link : CVE-2024-6221
JSON object : View
Products Affected
corydolphin
- flask-cors
CWE