Flask-Security vulnerable to Open Redirect
Moderate severity
GitHub Reviewed
Published
Oct 7, 2022
to the GitHub Advisory Database
•
Updated Jan 29, 2023
Description
Published by the National Vulnerability Database
Aug 2, 2022
Published to the GitHub Advisory Database
Oct 7, 2022
Reviewed
Oct 7, 2022
Last updated
Jan 29, 2023
This affects all versions of package Flask-Security. When using the
get_post_logout_redirect
andget_post_login_redirect
functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as\\\evil.com/path
. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using'autocorrect_location_header=False
.Note: Flask-Security is not maintained anymore.
References