Skip to content

chore(deps): update dependency flask-cors to v6 [security]#68

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/pypi-flask-cors-vulnerability
Open

chore(deps): update dependency flask-cors to v6 [security]#68
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/pypi-flask-cors-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate Bot commented Aug 6, 2024

This PR contains the following updates:

Package Change Age Confidence
Flask-Cors ==3.0.8==6.0.0 age confidence

Flask-Cors Directory Traversal vulnerability

CVE-2020-25032 / GHSA-xc3p-ff3m-f46v

More information

Details

An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.

Severity

  • CVSS Score: 8.7 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


flask-cors vulnerable to log injection when the log level is set to debug

CVE-2024-1681 / GHSA-84pr-m4jr-85g5

More information

Details

corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Flask-CORS allows the Access-Control-Allow-Private-Network CORS header to be set to true by default

CVE-2024-6221 / GHSA-hxwh-jpp2-84pm

More information

Details

A vulnerability in corydolphin/flask-cors version 4.0.1 allows the Access-Control-Allow-Private-Network CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.

Severity

  • CVSS Score: 8.7 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Flask-CORS allows for inconsistent CORS matching

CVE-2024-6844 / GHSA-8vgw-p6qm-5gr7

More information

Details

A vulnerability in corydolphin/flask-cors version 5.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a space ' '. This behavior leads to incorrect path normalization, causing potential mismatches in CORS configuration. As a result, endpoints may not be matched correctly to their CORS settings, leading to unexpected CORS policy application. This can cause unauthorized cross-origin access or block valid requests, creating security vulnerabilities and usability issues.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Flask-CORS vulnerable to Improper Handling of Case Sensitivity

CVE-2024-6866 / GHSA-43qf-4rqw-9q2g

More information

Details

corydolphin/flask-cors version 5.0.1 contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Flask-CORS improper regex path matching vulnerability

CVE-2024-6839 / GHSA-7rxf-gvfg-47g4

More information

Details

corydolphin/flask-cors version 5.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

Severity

  • CVSS Score: 4.3 / 10 (Medium)
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

corydolphin/flask-cors (Flask-Cors)

v6.0.0

Compare Source

Breaking

Path specificity ordering has changed to improve specificity. This may break users who expected the previous incorrect ordering.

What's Changed

Full Changelog: corydolphin/flask-cors@5.0.1...6.0.0

v5.0.1

Compare Source

What's Changed

This primarily changes packaging to use uv and a new release pipeline, along with some small documentation improvements

New Contributors

Full Changelog: corydolphin/flask-cors@5.0.0...5.0.01

v5.0.0

Compare Source

What's Changed

Full Changelog: corydolphin/flask-cors@4.0.2...5.0.0

v4.0.2

Compare Source

What's Changed

New Contributors

Full Changelog: corydolphin/flask-cors@4.0.1...4.0.2

v4.0.1

Compare Source

Security

v4.0.0

Compare Source

v3.0.10

Compare Source

Adds support for PPC64 and ARM64 builds for distribution. Thanks @​sreekanth370

v3.0.9

Compare Source

Security
  • Escape path before evaluating resource rules (thanks to Colby Morgan). Prior to this, flask-cors incorrectly
    evaluated CORS resource matching before path expansion. E.g. "/api/../foo.txt" would incorrectly match resources for
    "/api/*" whereas the path actually expands simply to "/foo.txt"

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v4 [security] chore(deps): update dependency flask-cors to v5 [security] Sep 3, 2024
@renovate renovate Bot force-pushed the renovate/pypi-flask-cors-vulnerability branch from 0108fac to 5e16f04 Compare September 3, 2024 16:36
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v5 [security] chore(deps): update dependency flask-cors to v4 [security] Sep 17, 2024
@renovate renovate Bot force-pushed the renovate/pypi-flask-cors-vulnerability branch from 5e16f04 to e076b49 Compare September 17, 2024 19:23
@renovate renovate Bot force-pushed the renovate/pypi-flask-cors-vulnerability branch from e076b49 to 535d923 Compare May 17, 2025 21:22
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v4 [security] chore(deps): update dependency flask-cors to v6 [security] May 17, 2025
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v6 [security] chore(deps): update dependency flask-cors to v6 [security] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
@renovate renovate Bot deleted the renovate/pypi-flask-cors-vulnerability branch March 27, 2026 01:02
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v6 [security] - autoclosed chore(deps): update dependency flask-cors to v6 [security] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/pypi-flask-cors-vulnerability branch 2 times, most recently from 535d923 to e44603c Compare March 30, 2026 17:39
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v6 [security] chore(deps): update dependency flask-cors to v6 [security] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot changed the title chore(deps): update dependency flask-cors to v6 [security] - autoclosed chore(deps): update dependency flask-cors to v6 [security] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/pypi-flask-cors-vulnerability branch 2 times, most recently from e44603c to 41585c9 Compare April 27, 2026 21:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants