CVE-2022-24880
25.04.2022, 22:15
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround the issue by not explicitly checking that the value is False. Checking the return value less explicitly should still work.Enginsight
Vendor | Product | Version |
---|---|---|
flask-session-captcha_project | flask-session-captcha | 𝑥 < 1.2.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-253 - Incorrect Check of Function Return ValueThe software incorrectly checks a return value from a function, which prevents the software from detecting errors or exceptional conditions.
- CWE-754 - Improper Check for Unusual or Exceptional ConditionsThe software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.
References