Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Open Redirect
Vulnerability Description
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Vulnerability Type
N/A
Vulnerability Title
Flask-Unchained 输入验证错误漏洞
Vulnerability Description
Flask-Unchained是开源的一个 Flask 扩展、一个可插拔的应用程序工厂和一组可选的“包”,它们共同为Flask 及其扩展生态系统创建了一个现代的、完全集成的、高度可定制的 Web 框架。 Flask-Unchained 0.9.0之前版本存在安全漏洞,该漏洞源于使用 _validate_redirect_url 函数时,可以通过提供多个反斜杠(例如 \evil.com/path)绕过 URL 验证并将用户重定向到任意 URL。只有当使用了除Werkzeug之外的另一个WSGI服务器,或者使
CVSS Information
N/A
Vulnerability Type
N/A