Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-23393
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Open Redirect
Source: NVD (National Vulnerability Database)
Vulnerability Description
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Flask-Unchained 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Flask-Unchained是开源的一个 Flask 扩展、一个可插拔的应用程序工厂和一组可选的“包”,它们共同为Flask 及其扩展生态系统创建了一个现代的、完全集成的、高度可定制的 Web 框架。 Flask-Unchained 0.9.0之前版本存在安全漏洞,该漏洞源于使用 _validate_redirect_url 函数时,可以通过提供多个反斜杠(例如 \evil.com/path)绕过 URL 验证并将用户重定向到任意 URL。只有当使用了除Werkzeug之外的另一个WSGI服务器,或者使
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-Flask-Unchained unspecified ~ 0.9.0 -
II. Public POCs for CVE-2021-23393
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-23393
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-23393

No comments yet


Leave a comment