First published: Sun Aug 18 2024(Updated: )
A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Flask-Cors | <4.0.2 | 4.0.2 |
Flask-CORS | =4.0.1 | |
=4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6221 has a high severity level due to the risk of unauthorized access to private network resources.
To fix CVE-2024-6221, upgrade Flask-Cors to version 4.0.2 or later.
CVE-2024-6221 specifically affects Flask-Cors version 4.0.1.
CVE-2024-6221 introduces the risk of exposing private network resources due to a misconfigured CORS header.
If not addressed, CVE-2024-6221 can lead to unauthorized external access to sensitive network resources.