First published: Mon Aug 31 2020(Updated: )
An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Flask-Cors | <3.0.9 | 3.0.9 |
debian/python-flask-cors | <=3.0.8-2<=3.0.7-1 | 3.0.7-1+deb10u1 3.0.9-1 |
debian/python-flask-cors | 3.0.7-1+deb10u1 3.0.9-2 3.0.10-2 4.0.0-1 | |
Flask-cors Project Flask-cors | <3.0.9 | |
Debian Debian Linux | =10.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
<3.0.9 | ||
=10.0 | ||
=15.0-sp1 | ||
=15.0-sp2 | ||
=15.1 | ||
=15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25032 is a vulnerability in Flask-CORS (CORS Middleware for Flask) before version 3.0.9 that allows directory traversal to access private resources.
CVE-2020-25032 has a severity rating of 7.5 (High).
The affected software includes Flask-CORS before version 3.0.9 and python-flask-cors packages with specific versions in Debian and openSUSE Backports SLE.
To fix CVE-2020-25032, update Flask-CORS to version 3.0.9 and python-flask-cors packages to the recommended versions.
You can find more information about CVE-2020-25032 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-25032), [GitHub Commit](https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895), [GitHub Releases](https://github.com/corydolphin/flask-cors/releases/tag/3.0.9)