Snyk
security.snyk.io › snyk vulnerability database › pip › flask
flask 2.1.2 vulnerabilities | Snyk
Learn more about known flask 2.1.2 vulnerabilities and licenses detected.
Snyk
security.snyk.io › snyk vulnerability database › pip › flask-appbuilder
Flask-AppBuilder@2.1.2 - Snyk Vulnerability Database
Learn more about known Flask-AppBuilder 2.1.2 vulnerabilities and licenses detected.
Snyk
security.snyk.io › snyk vulnerability database › pip › flask-cors
flask-cors 2.1.2 vulnerabilities | Snyk
Learn more about known flask-cors 2.1.2 vulnerabilities and licenses detected.
Vulmon
vulmon.com › home › search results
flask vulnerabilities and exploits
The Flask-Caching extension up to and including 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct ...
Snyk
snyk.io › snyk vulnerability database › pip
flask | Snyk
June 30, 2021 - Security vulnerabilities and package health score for pip package flask
Cybersecurity Help
cybersecurity-help.cz › vdb › SB2023050221
Information disclosure in Flask
May 2, 2023 - Exploit availability: No Description · The vulnerability allows a remote attacker to gain access to potentially sensitive information. The vulnerability exists due to missing Vary: Cookie header. A remote attacker can gain unauthorized access to sensitive information on the system.
Snyk
security.snyk.io › snyk vulnerability database › pip › flask
Flask 2.0.2 vulnerabilities | Snyk
Learn more about known Flask 2.0.2 vulnerabilities and licenses detected.
GitHub
github.com › aws › aws-sam-cli › issues › 5155
Dependency security: Upgrade the requirements for Flask · Issue #5155 · aws/aws-sam-cli
May 11, 2023 - Flask has a HIGH severity security vulnerability CVE-2023-30861 [https://avd.aquasec.com/nvd/cve-2023-30861], which is fixed in versions 2.3.2 and 2.2.5, however aws-sam-cli requires Flask<2.1, which can only be satisfied via Flask version 2.0.3. It would be awesome if this could be fixed to thus reduce the surface area of attack of Python Flask projects using this.
Published May 11, 2023
Author pohutukawa
NIST
nvd.nist.gov › vuln › detail › CVE-2021-21241
CVE-2021-21241 Detail - NVD
January 11, 2021 - This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States
Snyk
security.snyk.io › snyk vulnerability database › pip › flask
flask 2.2.2 vulnerabilities | Snyk
Learn more about known flask 2.2.2 vulnerabilities and licenses detected.
HackTricks
book.hacktricks.xyz › network-services-pentesting › pentesting-web › werkzeug
Werkzeug / Flask Debug - HackTricks
Upon collating all necessary data, the exploit script can be executed to generate the Werkzeug console PIN. The script uses the assembled probably_public_bits and private_bits to create a hash, which then undergoes further processing to produce the final PIN.
Netapp
security.netapp.com › advisory › ntap-20230818-0006
CVE-2023-30861 Flask Vulnerability in NetApp Products
NetApp is an industry leader in developing and implementing product security standards. Learn how we can help you maintain the confidentiality, integrity, and availability of your data.
GitHub
github.com › wdahlenburg › werkzeug-debug-console-bypass
GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. · GitHub
The Werkzeug documentation warns users to never enable the debug console in production with or without a pin (https://werkzeug.palletsprojects.com/en/2.0.x/debug/#debugger-pin). This repo provides a sample application to play with the /console endpoint on a dummy Flask application.
Starred by 63 users
Forked by 7 users
Languages Python 85.8% | Dockerfile 14.2%
GitHub
github.com › nicolas-carolo › houndsploit
GitHub - nicolas-carolo/houndsploit: An advanced graphical search engine for Exploit-DB
HoundSploit is an advanced search engine for Exploit-DB developed in Python using Flask as micro web framework, born with the aim of showing the user the most accurate search results.
Starred by 119 users
Forked by 20 users
Languages Python 55.5% | HTML 19.5% | CSS 15.3% | Shell 5.2% | JavaScript 3.6% | PowerShell 0.8% | Makefile 0.1% | Python 55.5% | HTML 19.5% | CSS 15.3% | Shell 5.2% | JavaScript 3.6% | PowerShell 0.8% | Makefile 0.1%
Nvisium
blog.nvisium.com › injecting-flask
Injecting Flask
July 5, 2018 - The template engine provided within the Flask framework may allow developers to introduce Server-Side Template Injection vulnerabilities. If you’re unfamiliar check out the whitepaper(PDF) by James Kettle. Briefly, this vulnerability allows an attacker to inject language/syntax into templates.
NIST
nvd.nist.gov › vuln › detail › CVE-2023-30861
CVE-2023-30861 Detail - NVD
May 2, 2023 - This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States