First published: Tue Feb 28 2023(Updated: )
Werkzeug ======== Werkzeug started as simple collection of various<br>utilities for WSGI applications and has become one of the most advanced<br>WSGI utility modules. It includes a powerful debugger, full featured<br>request and response objects, HTTP utilities to handle entity tags, cache<br>control headers, HTTP dates, cookie handling, file uploads, a powerful URL<br>routing system and a bunch of community contributed addon modules. Werkzeug<br>is unicode aware and doesn't enforce a specific template engine, database<br>adapter or anything else. It doesn't even enforce a specific way of<br>handling requests and leaves all that up to the developer. It's most useful<br>for end user applications which should work on as many server environments<br>as possible (such as blogs, wikis, bulletin boards, etc.).<br>Security Fix(es):<br><li> high resource usage when parsing multipart form data with many fields</li> (CVE-2023-25577)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-werkzeug | <2.0.1-5.el9 | 2.0.1-5.el9 |
redhat/python3-werkzeug | <2.0.1-5.el9 | 2.0.1-5.el9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1018 is classified as important.
To fix RHSA-2023:1018, upgrade your python-werkzeug and python3-werkzeug packages to version 2.0.1-5.el9.
Versions of python-werkzeug and python3-werkzeug prior to 2.0.1-5.el9 are affected by RHSA-2023:1018.
RHSA-2023:1018 is not classified as a critical vulnerability, but it is important to address it.
RHSA-2023:1018 involves the python-werkzeug and python3-werkzeug packages.