CVE-2024-6844

A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
@huntr_aiCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
Debian logo
Debian Releases
Debian Product
Codename
python-flask-cors
bullseye
vulnerable
bookworm
postponed
bullseye (security)
3.0.9-2+deb11u1
fixed
trixie
6.0.1-1
fixed
sid
6.0.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-flask-cors
plucky
Fixed 5.0.0-1ubuntu0.1
released
oracular
Fixed 4.0.1-1ubuntu0.1
released
noble
Fixed 4.0.0-1ubuntu0.1~esm1
released
jammy
Fixed 3.0.9-2ubuntu0.1
released
focal
Fixed 3.0.8-2ubuntu0.1+esm1
released
Common Weakness Enumeration