{"schema_version":"1.7.2","id":"OESA-2024-1713","modified":"2024-06-14T11:08:15Z","published":"2024-06-14T11:08:15Z","upstream":["CVE-2024-1681"],"summary":"python-Flask-Cors security update","details":"A Flask extension for handling Cross Origin Resource Sharing (CORS), making cross-origin AJAX possible.\r\n\r\nSecurity Fix(es):\r\n\r\ncorydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.(CVE-2024-1681)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-Flask-Cors","purl":"pkg:rpm/openEuler/python-Flask-Cors\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.0-2.oe2403"}]}],"ecosystem_specific":{"noarch":["python-Flask-Cors-help-4.0.0-2.oe2403.noarch.rpm","python3-Flask-Cors-4.0.0-2.oe2403.noarch.rpm"],"src":["python-Flask-Cors-4.0.0-2.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1713"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1681"}],"database_specific":{"severity":"Medium"}}