Safety vulnerability ID: 64223
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 0.0.7
Web based code editor on flask
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files. See CVE-2023-52288.
MISC:https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application