First published: Wed Nov 18 2020(Updated: )
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palletsprojects Werkzeug | <0.11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28724 is an open redirect vulnerability in Werkzeug before version 0.11.6 that can be exploited via a double slash in the URL.
CVE-2020-28724 has a severity score of 6.1, indicating a medium level of severity.
Werkzeug versions up to and excluding 0.11.6 are affected by CVE-2020-28724.
To fix CVE-2020-28724, update Werkzeug to version 0.11.6 or newer.
You can find more information about CVE-2020-28724 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-28724), [GitHub Issue 1639](https://github.com/pallets/flask/issues/1639), [GitHub Issue 822](https://github.com/pallets/werkzeug/issues/822).