Safety vulnerability ID: 70813
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Flask-cors 4.0.1 addresses the CVE-2024-1681: corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
Latest version: 5.0.0
A Flask extension adding a decorator for CORS support
Security
* Address [CVE-2024-1681](https://github.com/advisories/GHSA-84pr-m4jr-85g5) which is a log injection vulnerability when the log level is set to debug by aneshujevic in https://github.com/corydolphin/flask-cors/pull/351
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application