PyPi: Flaskcode

CVE-2023-52289

Safety vulnerability ID: 64224

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jan 13, 2024 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files.

Affected package

flaskcode

Latest version: 0.0.7

Web based code editor on flask

Affected versions

Fixed versions

Vulnerability changelog

An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files. See CVE-2023-52289.


MISC:https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE