TROYANOSYVIRUS
Back to CVEs

CVE-2021-23393

MEDIUM
5.4

Description

This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

CVE Details

CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published6/11/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

flask_unchained_project:flask_unchained

Weaknesses (CWE)

CWE-601

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.