Cross Origin Resource Sharing ( CORS ) support for Flask
[email protected] has vulnerabilities — update to latest
Update to >= 4.0.2 to fix known vulnerabilities
| Severity | ID | Summary | Fixed in |
|---|---|---|---|
| medium | CVE-2024-6866 | Flask-CORS vulnerable to Improper Handling of Case Sensitivity | 6.0.0 |
| medium | CVE-2024-6839 | Flask-CORS improper regex path matching vulnerability | 6.0.0 |
| medium | CVE-2024-1681 | flask-cors vulnerable to log injection when the log level is set to debug | 4.0.1 |
| medium | CVE-2024-6844 | Flask-CORS allows for inconsistent CORS matching | 6.0.0 |
| high | CVE-2024-6221 | Flask-CORS allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default | 4.0.2 |
| high | CVE-2024-6221 | A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions. | 4.0.2 |
Get this data programmatically — free, no authentication.
curl https://depscope.dev/api/check/conda/flask_corsFirst published · 2020-08-31 03:02:26.432000+00:00
Last updated · 2025-04-22 14:57:19.339000+00:00