Flask-cors Project

Flask-cors

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Published 20.03.2025 10:10:59
  • Last modified 01.08.2025 01:36:17

corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the `try_match` function, which is originally intended for matching hosts. This results in a mismatch because paths in ...

Exploit
  • EPSS 0.06%
  • Published 20.03.2025 10:10:51
  • Last modified 01.08.2025 01:32:18

A vulnerability in corydolphin/flask-cors version 4.0.1 allows for inconsistent CORS matching due to the handling of the '+' character in URL paths. The request.path is passed through the unquote_plus function, which converts the '+' character to a s...

Exploit
  • EPSS 0.12%
  • Published 20.03.2025 10:09:42
  • Last modified 01.08.2025 12:26:41

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to s...

  • EPSS 1.25%
  • Published 31.08.2020 04:15:12
  • Last modified 21.11.2024 05:16:42

An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.