First published: Wed Mar 15 2023(Updated: )
Werkzeug started as simple collection of various<br>utilities for WSGI applications and has become one of the most advanced<br>WSGI utility modules. It includes a powerful debugger, full featured<br>request and response objects, HTTP utilities to handle entity tags, cache<br>control headers, HTTP dates, cookie handling, file uploads, a powerful URL<br>routing system and a bunch of community contributed addon modules. Werkzeug<br>is unicode aware and doesn't enforce a specific template engine, database<br>adapter or anything else. It doesn't even enforce a specific way of<br>handling requests and leaves all that up to the developer. It's most useful<br>for end user applications which should work on as many server environments<br>as possible (such as blogs, wikis, bulletin boards, etc.).<br>Security Fix(es):<br><li> high resource usage when parsing multipart form data with many fields</li> (CVE-2023-25577)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-werkzeug | <0.14.1-12.el8 | 0.14.1-12.el8 |
redhat/python3-werkzeug | <0.14.1-12.el8 | 0.14.1-12.el8 |
redhat/python-werkzeug | <0.14.1-3.1.el7 | 0.14.1-3.1.el7 |
redhat/python2-werkzeug | <0.14.1-3.1.el7 | 0.14.1-3.1.el7 |
redhat/python2-werkzeug-doc | <0.14.1-3.1.el7 | 0.14.1-3.1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1281 is classified as important.
RHSA-2023:1281 affects python-werkzeug and python3-werkzeug versions up to 0.14.1-12.el8 and early versions of 0.14.1-3.1.el7.
To fix RHSA-2023:1281, upgrade the vulnerable packages to the latest recommended versions provided by Red Hat.
Impacted versions for RHSA-2023:1281 include python-werkzeug versions below 0.14.1-12.el8 and python3-werkzeug versions below 0.14.1-12.el8.
Yes, there is a known bug associated with RHSA-2023:1281, which can be tracked in Bugzilla.