Safety vulnerability ID: 41184
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Lin-CMS allows remote attackers to obtain sensitive information and/or gain privileges due to the application not invalidating a user's authentication token upon logout, which allows for replaying packets.
https://github.com/TaleLin/lin-cms-flask/issues/30
Latest version: 0.4.11
A simple and practical CMS implememted by flask
Incorrect Access Control in Lin-CMS-Flask v0.1.1 allows remote attackers to obtain sensitive information and/or gain privileges due to the application not invalidating a user's authentication token upon logout, which allows for replaying packets. See CVE-2020-18701.
MISC:https://github.com/TaleLin/lin-cms-flask/issues/30: https://github.com/TaleLin/lin-cms-flask/issues/30
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application