CVE-2024-34069

EUVD-2024-1358
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
palletsprojectswerkzeug
𝑥
< 3.0.3
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-werkzeug
bookworm
2.2.2-3+deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1.0.1+dfsg1-2+deb11u2
fixed
buster
postponed
forky
3.1.4-1
fixed
sid
3.1.4-1
fixed
trixie
3.1.3-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-werkzeug
bionic
Fixed 0.14.1+dfsg1-1ubuntu0.2+esm1
released
focal
Fixed 0.16.1+dfsg1-2ubuntu0.2
released
jammy
Fixed 2.0.2+dfsg1-1ubuntu0.22.04.2
released
mantic
Fixed 2.2.2-3ubuntu0.1
released
noble
Fixed 3.0.1-3ubuntu0.1
released
xenial
Fixed 0.10.4+dfsg1-1ubuntu1.2+esm2
released