Safety vulnerability ID: 59177
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Flask-AppBuilder 4.3.2 includes a fix for an Information Disclosure vulnerability.
https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3
Latest version: 4.5.2
Simple and rapid application development framework, built on top of Flask. includes detailed security, auto CRUD generation for your models, google charts and much more.
Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2. See CVE-2023-34110.
MISC:https://github.com/dpgaspar/Flask-AppBuilder/commit/ae25ad4c87a9051ebe4a4e8f02aee73232642626: https://github.com/dpgaspar/Flask-AppBuilder/commit/ae25ad4c87a9051ebe4a4e8f02aee73232642626
MISC:https://github.com/dpgaspar/Flask-AppBuilder/pull/2045: https://github.com/dpgaspar/Flask-AppBuilder/pull/2045
MISC:https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.3.2: https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.3.2
MISC:https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3: https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application