CVE-2024-6221

A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
@huntr_aiCNA
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
VendorProductVersion
corydolphinflask-cors
4.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-flask-cors
bullseye
3.0.9-2
not-affected
bookworm
3.0.10-2
not-affected
bullseye (security)
3.0.9-2+deb11u1
fixed
trixie
6.0.1-1
fixed
sid
6.0.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-flask-cors
plucky
not-affected
oracular
Fixed 4.0.1-1ubuntu0.1
released
noble
Fixed 4.0.0-1ubuntu0.1~esm1
released
jammy
Fixed 3.0.9-2ubuntu0.1
released
focal
Fixed 3.0.8-2ubuntu0.1+esm1
released