Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Jcharis Machine-Learning-Web-Apps Jinja2 Template app.py render_template cross site scripting
Vulnerability Description
A vulnerability was identified in Jcharis Machine-Learning-Web-Apps up to a6996b634d98ccec4701ac8934016e8175b60eb5. The impacted element is the function render_template of the file Machine-Learning-Web-Apps-master/Build-n-Deploy-Flask-App-with-Waypoint/app/app.py of the component Jinja2 Template Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Machine-Learning-Web-Apps 代码注入漏洞
Vulnerability Description
Machine-Learning-Web-Apps是JCharis Jesse个人开发者的一个机器学习Web应用开发框架。 Machine-Learning-Web-Apps存在代码注入漏洞,该漏洞源于对组件Jinja2 Template Handler中文件Machine-Learning-Web-Apps-master/Build-n-Deploy-Flask-App-with-Waypoint/app/app.py函数render_template的错误操作,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A