2020-12-22 16:01:42 +00:00
{
"CVE_data_meta" : {
2021-01-11 13:34:16 -07:00
"ASSIGNER" : "security-advisories@github.com" ,
2020-12-22 16:01:42 +00:00
"ID" : "CVE-2021-21241" ,
2021-01-11 13:34:16 -07:00
"STATE" : "PUBLIC" ,
"TITLE" : "CSRF can expose users authentication token in Flask-Security-Too"
2020-12-22 16:01:42 +00:00
} ,
2021-01-11 13:34:16 -07:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "flask-security-too" ,
"version" : {
"version_data" : [
{
"version_value" : ">= 3.3.0, < 3.4.5"
}
]
}
}
]
} ,
"vendor_name" : "Flask-Middleware"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-12-22 16:01:42 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-01-11 21:02:00 +00:00
"value" : "The Python \"Flask-Security-Too\" package is used for adding security features to your Flask application. It is an is a independently maintained version of Flask-Security based on the 3.0.0 version of Flask-Security. In Flask-Security-Too from version 3.3.0 and before version 3.4.5, the /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. Version 3.4.5 and version 4.0.0 are patched. As a workaround, if you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to \"0\" (seconds) which should make the token unusable."
2021-01-11 13:34:16 -07:00
}
]
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.4 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"privilegesRequired" : "NONE" ,
"scope" : "CHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-352: Cross-Site Request Forgery (CSRF)"
}
]
2020-12-22 16:01:42 +00:00
}
]
2021-01-11 13:34:16 -07:00
} ,
"references" : {
"reference_data" : [
{
"name" : "https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv"
} ,
{
"name" : "https://github.com/Flask-Middleware/flask-security/pull/422" ,
"refsource" : "MISC" ,
"url" : "https://github.com/Flask-Middleware/flask-security/pull/422"
} ,
{
"name" : "https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f" ,
"refsource" : "MISC" ,
"url" : "https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f"
} ,
{
"name" : "https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a" ,
"refsource" : "MISC" ,
"url" : "https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a"
} ,
{
"name" : "https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5" ,
"refsource" : "MISC" ,
"url" : "https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5"
} ,
{
"name" : "https://pypi.org/project/Flask-Security-Too" ,
"refsource" : "MISC" ,
"url" : "https://pypi.org/project/Flask-Security-Too"
}
]
} ,
"source" : {
"advisory" : "GHSA-hh7m-rx4f-4vpv" ,
"discovery" : "UNKNOWN"
2020-12-22 16:01:42 +00:00
}
}