Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-23393— Open Redirect

CVSS 5.4 · Medium EPSS 0.20% · P42
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-23393

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Open Redirect
Source: NVD (National Vulnerability Database)
Vulnerability Description
This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Flask-Unchained 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Flask-Unchained是开源的一个 Flask 扩展、一个可插拔的应用程序工厂和一组可选的“包”,它们共同为Flask 及其扩展生态系统创建了一个现代的、完全集成的、高度可定制的 Web 框架。 Flask-Unchained 0.9.0之前版本存在安全漏洞,该漏洞源于使用 _validate_redirect_url 函数时,可以通过提供多个反斜杠(例如 \evil.com/path)绕过 URL 验证并将用户重定向到任意 URL。只有当使用了除Werkzeug之外的另一个WSGI服务器,或者使
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Flask-Unchained unspecified ~ 0.9.0 -

II. Public POCs for CVE-2021-23393

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-23393

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-06-10 · 52 CVEs total

CVE-2021-23024F5 BIG-IQ 命令注入漏洞
CVE-2021-34363thefuck 路径遍历漏洞
CVE-2021-34539AMP 输入验证错误漏洞
CVE-2019-25046Cerberus FTP Server Enterprise 跨站脚本漏洞
CVE-2021-20293Red Hat Resteasy 跨站脚本漏洞
CVE-2021-21735ZTE ZXHN H168N 信息泄露漏洞
CVE-2021-21736ZTE ZXHN HS562 访问控制错误漏洞
CVE-2021-20081ZOHO ManageEngine ServiceDesk Plus 安全漏洞
CVE-2021-31658TP-Link TL-SG2005和TP-Link TL-SG2008 输入验证错误漏洞
CVE-2021-31659Tp-link TP-Link TL-SG2005和TP-Link TL-SG2008 跨站请求伪造漏洞
CVE-2020-24662SmartStream Transaction Lifecycle Management 跨站脚本漏洞
CVE-2021-23023F5 BIG-IP Edge Gateway代码问题漏洞
CVE-2021-34555OpenDMARC 代码问题漏洞
CVE-2021-31927Annex Cloud Loyalty Experience Platform 安全漏洞
CVE-2021-31538LANCOM R&S Unified Firewalls 路径遍历漏洞
CVE-2021-34546NetSetMan Pro 授权问题漏洞
CVE-2021-23022F5 BIG-IP Edge Gateway 安全漏洞
CVE-2020-24668Trace Financial Crest Bridge 跨站脚本漏洞
CVE-2020-24663Trace Financial CRESTBridge 跨站脚本漏洞
CVE-2020-24671Trace Financial CRESTBridge SQL注入漏洞

Showing top 20 of 52 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-23393

No comments yet


Leave a comment