Vulmon
vulmon.com › home › search results
flask vulnerabilities and exploits
The Flask-Caching extension up to and including 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct ...
GitHub
github.com › stephenbradshaw › breakableflask
GitHub - stephenbradshaw/breakableflask: Simple vulnearable Flask web application · GitHub
A simple vulnerable Flask application. This can be used to test out and learn exploitation of common web application vulnerabilities. Originally written because I wanted a very simple, single file vulnerable app that I could quickly run up to perform exploitation checks against. At the moment, the following vulnerabilities are present: Python code injection ·
Starred by 30 users
Forked by 219 users
Languages Python
Videos
HackTricks
book.hacktricks.xyz › home › network services pentesting › pentesting web › flask
Flask - HackTricks
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Nvisium
blog.nvisium.com › injecting-flask
Injecting Flask
July 5, 2018 - Note: the Python code calls render_template with a template that isn’t an autoescaped file extension. Depending on the code in the template, hello.unsafe, we may be vulnerable to Cross-Site Scripting.
GitHub
github.com › guiadeappsec › vuln-flask-web-app
GitHub - guiadeappsec/vuln-flask-web-app: A vulnerable Python/Flask WebApp for educational purpose.
# how to exploit: # the url could be an local file, like: file:/etc/passwd # vulns/ssrf/ssrf.py with urllib.request.urlopen(url) as f: download_image_path = f"{app.config['PUBLIC_UPLOAD_FOLDER']}/downloaded-image.png" with open(download_image_path, 'wb') as file: file_content = f.read() file.write(file_content) file.close() public_url = f"{app.config['PUBLIC_UPLOADS_URL']}/downloaded-image.png"
Starred by 17 users
Forked by 7 users
Languages Python 52.9% | HTML 43.2% | JavaScript 2.3% | Python 52.9% | HTML 43.2% | JavaScript 2.3%
GitHub
github.com › CalfCrusher › Python-Pickle-RCE-Exploit
GitHub - CalfCrusher/Python-Pickle-RCE-Exploit: Python Pickle RCE Exploit + vulnerable Flask App · GitHub
A simple RCE Pickle PoC with a vulnerable Flask App · In Python, the pickle module lets you serialize and deserialize data. Essentially, this means that you can convert a Python object into a stream of bytes and then reconstruct it (including the object’s internal structure) later in a different process or environment by loading that stream of bytes (for further info checkout this: https://davidhamann.de/2020/04/05/exploiting-python-pickle/
Starred by 15 users
Forked by 10 users
Languages Python
HackTricks
book.hacktricks.xyz › network-services-pentesting › pentesting-web › werkzeug
Werkzeug / Flask Debug - HackTricks
Upon collating all necessary data, the exploit script can be executed to generate the Werkzeug console PIN. The script uses the assembled probably_public_bits and private_bits to create a hash, which then undergoes further processing to produce the final PIN.
Pentest-Tools
pentest-tools.com › home
Python Flask-Security - Open Redirect (CVE-2021-32618) - Vulnerability & Exploit Database
July 4, 2023 - Python Flask-Security contains an open redirect vulnerability.
CVE Details
cvedetails.com › cve › CVE-2021-21241
CVE-2021-21241 : The Python "Flask-Security-Too" package is used for adding security features to
CVE-2021-21241 : The Python "Flask-Security-Too" package is used for adding security features to your Flask application. It is an is a independently maintained version
GitHub
github.com › iltosec › chain-lab-flask-exploit
GitHub - iltosec/chain-lab-flask-exploit · GitHub
This repository contains a Python script that exploits authentication bypass and remote code execution (RCE) vulnerabilities in a Flask web application. The goal is to demonstrate how these vulnerabilities can be used for a reverse shell attack.
Author iltosec
Pentest-Tools
pentest-tools.com › home
pyLoad Flask Config - Access Control (CVE-2024-21644) - Vulnerability & Exploit Database
January 31, 2024 - Cisa KevThis CVE is not part of the CISA Known Exploited Vulnerabilities Catalog · No · Exploitable with Sniper · No · CVE Published · Jan 8, 2024 · Detection added atThe date when the detection was added to Pentest-Tools.com · Jan 31, 2024 · Software Type ·
OWASP
owasp.org › www-project-vulnerable-flask-app
OWASP Vulnerable Flask App | OWASP Foundation
cd Vulnerable-Flask-App · sudo pip3 install -r requirements.txt · python3 vulnerable-flask-app.py · https://twitter.com/anilyelken06 · https://medium.com/@anilyelken · https://github.com/anil-yelken · Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.
GitHub
github.com › lokori › flask-vuln
GitHub - lokori/flask-vuln: Pretty vulnerable flask app..
September 29, 2017 - Install Python + Flask (pip install flask) export FLASK_APP=flask-vuln.py · flask run · Or use run.sh. Or use run_docker.sh (which builds the image and starts a container). Remember to stop and remove the container after you're done. Enjoy the puzzles at http://localhost:5000 ·
Starred by 22 users
Forked by 12 users
Languages HTML 63.2% | Python 32.2% | Shell 2.5% | Dockerfile 2.1% | HTML 63.2% | Python 32.2% | Shell 2.5% | Dockerfile 2.1%
F5
my.f5.com › manage › s › article › K63597327
K63597327: Python Flask vulnerability CVE-2018-1000656
June 22, 2021 - Loading · ×Sorry to interrupt · Refresh
Ajin Abraham
ajinabraham.com › blog › exploiting-insecure-file-extraction-in-python-for-code-execution
Exploiting insecure file extraction in Python for code execution
September 28, 2017 - So if we can overwrite __init__.py file with arbitrary Python code inside a directory of the web application that act as a package, then we can achieve code execution if that package is imported by the application. For our code to execute, a server restart is required in most case. But in this example we are running a Flask server with debug set to True which means every time a Python file is changed, the server will do a restart.