corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
Release Notes
corydolphin/flask-cors (flask-cors)
### [`v4.0.1`](https://togithub.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#401)
[Compare Source](https://togithub.com/corydolphin/flask-cors/compare/4.0.0...4.0.1)
##### Security
- Address [CVE-2024-1681](https://togithub.com/advisories/GHSA-84pr-m4jr-85g5) which is a log injection vulnerability when the log level is set to debug by [@aneshujevic](https://togithub.com/aneshujevic) in [https://github.com/corydolphin/flask-cors/pull/351](https://togithub.com/corydolphin/flask-cors/pull/351)
### [`v4.0.0`](https://togithub.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#400)
[Compare Source](https://togithub.com/corydolphin/flask-cors/compare/3.0.10...4.0.0)
- Remove support for Python versions older than 3.8 by [@WAKayser](https://togithub.com/WAKayser) in [https://github.com/corydolphin/flask-cors/pull/330](https://togithub.com/corydolphin/flask-cors/pull/330)
- Add GHA tooling by [@corydolphin](https://togithub.com/corydolphin) in [https://github.com/corydolphin/flask-cors/pull/331](https://togithub.com/corydolphin/flask-cors/pull/331)
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Paris, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
[ ] If you want to rebase/retry this PR, check this box
This PR contains the following updates:
3.0.10
->4.0.1
GitHub Vulnerability Alerts
CVE-2024-1681
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
Release Notes
corydolphin/flask-cors (flask-cors)
### [`v4.0.1`](https://togithub.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#401) [Compare Source](https://togithub.com/corydolphin/flask-cors/compare/4.0.0...4.0.1) ##### Security - Address [CVE-2024-1681](https://togithub.com/advisories/GHSA-84pr-m4jr-85g5) which is a log injection vulnerability when the log level is set to debug by [@aneshujevic](https://togithub.com/aneshujevic) in [https://github.com/corydolphin/flask-cors/pull/351](https://togithub.com/corydolphin/flask-cors/pull/351) ### [`v4.0.0`](https://togithub.com/corydolphin/flask-cors/blob/HEAD/CHANGELOG.md#400) [Compare Source](https://togithub.com/corydolphin/flask-cors/compare/3.0.10...4.0.0) - Remove support for Python versions older than 3.8 by [@WAKayser](https://togithub.com/WAKayser) in [https://github.com/corydolphin/flask-cors/pull/330](https://togithub.com/corydolphin/flask-cors/pull/330) - Add GHA tooling by [@corydolphin](https://togithub.com/corydolphin) in [https://github.com/corydolphin/flask-cors/pull/331](https://togithub.com/corydolphin/flask-cors/pull/331)Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Paris, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.