Medium
medium.com › swlh › hacking-flask-applications-939eae4bffed
Hacking Flask Applications. Executing arbitrary commands using the… | by Vickie Li | The Startup | Medium
February 18, 2020 - Hacking Flask Applications Executing arbitrary commands using the Werkzeug Debugger One of the very first web applications I made was developed using Flask. It was the best choice since it has a lot …
F5
my.f5.com › manage › s › article › K63597327
K63597327: Python Flask vulnerability CVE-2018-1000656
June 22, 2021 - Loading · ×Sorry to interrupt · Refresh
Videos
01:09:46
HackTheBox - Noter - Cracking Flask Cookies and performing MySQL ...
- YouTube
16:43
HackPack CTF - Forging Python Flask Session Cookies - YouTube
01:26:38
HackTheBox - Ellingson - YouTube
03:20
Python SSTI: Attack Flask framework using Jinja2 template engine ...
Pentest-Tools
pentest-tools.com › home
pyLoad Flask Config - Access Control (CVE-2024-21644) - Vulnerability & Exploit Database
January 31, 2024 - Cisa KevThis CVE is not part of the CISA Known Exploited Vulnerabilities Catalog · No · Exploitable with Sniper · No · CVE Published · Jan 8, 2024 · Detection added atThe date when the detection was added to Pentest-Tools.com · Jan 31, 2024 · Software Type ·
GitHub
github.com › iltosec › chain-lab-flask-exploit
GitHub - iltosec/chain-lab-flask-exploit · GitHub
This repository contains a Python script that exploits authentication bypass and remote code execution (RCE) vulnerabilities in a Flask web application. The goal is to demonstrate how these vulnerabilities can be used for a reverse shell attack.
Author iltosec
Vulmon
vulmon.com › home › search results
flask vulnerabilities and exploits
This affects the package Flask-Unchained prior to 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path.
YouTube
youtube.com › watch
DANGEROUS Python Flask Debug Mode Vulnerabilities - YouTube
Snyk is the sponsor for this video and deserves some love, try it out to find vulnerabilities in your own applications! https://jh.live/snykHelp the channel ...
Published September 8, 2022
GitHub
github.com › stephenbradshaw › breakableflask
GitHub - stephenbradshaw/breakableflask: Simple vulnearable Flask web application · GitHub
A simple vulnerable Flask application. This can be used to test out and learn exploitation of common web application vulnerabilities.
Starred by 30 users
Forked by 219 users
Languages Python
OWASP
owasp.org › www-project-vulnerable-flask-app
OWASP Vulnerable Flask App | OWASP Foundation
It is a vulnerable Flask Web App.
Netapp
security.netapp.com › advisory › ntap-20230818-0006
CVE-2023-30861 Flask Vulnerability in NetApp Products
NetApp is an industry leader in developing and implementing product security standards. Learn how we can help you maintain the confidentiality, integrity, and availability of your data.
Nvisium
blog.nvisium.com › injecting-flask
Injecting Flask
July 5, 2018 - The template engine provided within the Flask framework may allow developers to introduce Server-Side Template Injection vulnerabilities. If you’re unfamiliar check out the whitepaper(PDF) by James Kettle. Briefly, this vulnerability allows an attacker to inject language/syntax into templates.
HackTricks
book.hacktricks.xyz › home › network services pentesting › pentesting web › flask
Flask - HackTricks
Command line tool to brute-force websites using cookies crafted with flask-unsign.
Reddit
reddit.com › r/flask › do not leak your secret key, here's how an attacker might approach an exposed secret key
r/flask on Reddit: Do NOT leak your secret key, here's how an attacker might approach an exposed secret key
October 22, 2020 - Source code contains Flask secret key Secret key gives us new user input properties User input gives us an exec without builtins We bypass the exec without builtins and get a shell in a docker container We find a database in the docker container containing credentials We use the credentials to bruteforce ssh and get a login We find a binary running as root, reverse engineer it and exploit a buffer overflow
HackTricks
book.hacktricks.xyz › network-services-pentesting › pentesting-web › werkzeug
Werkzeug / Flask Debug - HackTricks
Upon collating all necessary data, the exploit script can be executed to generate the Werkzeug console PIN. The script uses the assembled probably_public_bits and private_bits to create a hash, which then undergoes further processing to produce the final PIN.
GitHub
github.com › CalfCrusher › Python-Pickle-RCE-Exploit
GitHub - CalfCrusher/Python-Pickle-RCE-Exploit: Python Pickle RCE Exploit + vulnerable Flask App · GitHub
A simple RCE Pickle PoC with a vulnerable Flask App · In Python, the pickle module lets you serialize and deserialize data. Essentially, this means that you can convert a Python object into a stream of bytes and then reconstruct it (including the object’s internal structure) later in a different process or environment by loading that stream of bytes (for further info checkout this: https://davidhamann.de/2020/04/05/exploiting-python-pickle/
Starred by 15 users
Forked by 10 users
Languages Python
GitHub
github.com › lokori › flask-vuln
GitHub - lokori/flask-vuln: Pretty vulnerable flask app..
September 29, 2017 - If you run this for other people, somewhere, you should add --host=0.0.0.0 to flask command parameters to listen for all IP addresses.
Starred by 22 users
Forked by 12 users
Languages HTML 63.2% | Python 32.2% | Shell 2.5% | Dockerfile 2.1% | HTML 63.2% | Python 32.2% | Shell 2.5% | Dockerfile 2.1%
IBM
ibm.com › support › pages › security-bulletin-vulnerability-flask-and-python-affects-ibm-spectrum-protect-plus-microsoft-file-systems-backup-and-restore-cve-2021-33026-cve-2022-0391
Security Bulletin: Vulnerability in Flask and Python affects IBM Spectrum Protect Plus Microsoft File Systems Backup and Restore (CVE-2021-33026, CVE-2022-0391)
March 11, 2022 - CVEID: CVE-2021-33026 DESCRIPTION: ... deserialization flaw in Pickle. By sending a specially-crested payload, an authenticated attacker could exploit this vulnerability to gain elevated privileges to poison the cache, and execute Python code....