Safety vulnerability ID: 37684
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Webargs 5.5.2 and 6.0.0b4 include a fix for CVE-2020-7965: Flaskparser.py in Webargs doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
Latest version: 8.6.0
Declarative parsing and validation of HTTP request objects, with built-in support for popular web frameworks, including Flask, Django, Bottle, Tornado, Pyramid, Falcon, and aiohttp.
********************
Bug fixes:
* :cve:`CVE-2020-7965`: Don't attempt to parse JSON if request's content type is mismatched
(bugfix from 5.5.3).
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application