First published: Tue Feb 14 2023(Updated: )
Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug <= 2.2.2 will parse the cookie `=__Host-test=bad` as `__Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palletsprojects Werkzeug | <2.2.3 | |
pip/Werkzeug | <2.2.3 | 2.2.3 |
debian/python-werkzeug | <=0.14.1+dfsg1-4+deb10u1 | 0.14.1+dfsg1-4+deb10u2 1.0.1+dfsg1-2+deb11u1 2.2.2-3 |
debian/python-werkzeug | <=1.0.1+dfsg1-2<=2.2.2-2 | |
<2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23934 is a vulnerability in Werkzeug that allows browsers to allow nameless cookies.
Any vulnerable browser that allows "nameless" cookies can be affected.
The severity of CVE-2023-23934 is low, with a severity score of 3.5.
To fix CVE-2023-23934, update to Werkzeug version 2.2.3 or later.
You can find more information about CVE-2023-23934 on the official GitHub page of Pallets Werkzeug.