Safety vulnerability ID: 64223
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files.
Latest version: 0.0.7
Web based code editor on flask
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files. See CVE-2023-52288.
MISC:https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application