First published: Mon May 06 2024(Updated: )
Pallets Werkzeug could allow a remote attacker to execute arbitrary code on the system, caused by improper usage of a pathname and improper CSRF protection in the debugger. By persuading a victim to interact with a domain and subdomain they control, enter the debugger PIN and guess a URL in the developer's application that will trigger the debugger, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/python-werkzeug | <0.14.1+dfsg1-1ubuntu0.2+ | 0.14.1+dfsg1-1ubuntu0.2+ |
ubuntu/python-werkzeug | <0.16.1+dfsg1-2ubuntu0.2 | 0.16.1+dfsg1-2ubuntu0.2 |
ubuntu/python-werkzeug | <2.0.2+dfsg1-1ubuntu0.22.04.2 | 2.0.2+dfsg1-1ubuntu0.22.04.2 |
ubuntu/python-werkzeug | <2.2.2-3ubuntu0.1 | 2.2.2-3ubuntu0.1 |
ubuntu/python-werkzeug | <3.0.1-3ubuntu0.1 | 3.0.1-3ubuntu0.1 |
ubuntu/python-werkzeug | <0.10.4+dfsg1-1ubuntu1.2+ | 0.10.4+dfsg1-1ubuntu1.2+ |
pip/Werkzeug | <3.0.3 | 3.0.3 |
debian/python-werkzeug | <=1.0.1+dfsg1-2+deb11u1<=2.2.2-3 | 3.0.3-1 |
redhat/python-werkzeug | <3.0.3 | 3.0.3 |
IBM Concert Software | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.