Safety vulnerability ID: 64224
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Flaskcode is affected by a path traversal vulnerability. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files.
Latest version: 0.0.7
Web based code editor on flask
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files. See CVE-2023-52289.
MISC:https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application