Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk:High] flask Information Exposure (due by 06/09/2023) #5440

Closed
2 tasks
cnlucas opened this issue May 10, 2023 · 0 comments · Fixed by #5463, #5489 or #5508
Closed
2 tasks

[Snyk:High] flask Information Exposure (due by 06/09/2023) #5440

cnlucas opened this issue May 10, 2023 · 0 comments · Fixed by #5463, #5489 or #5508
Assignees
Labels
Security: general General security concern or issue Security: high Remediate within 30 days
Milestone

Comments

@cnlucas
Copy link
Member

cnlucas commented May 10, 2023

Introduced through
flask@2.1.2, flask-apispec@0.7.0 and others
Fixed in
flask@2.2.5, @2.3.2

Exploit maturity
No known exploit

Detailed paths and remediation

Introduced through: project@0.0.0 › flask@2.1.2
Fix: Upgrade flask to version 2.2.5 or 2.3.2

Introduced through: project@0.0.0 › flask-apispec@0.7.0 › flask@2.1.2
Fix: Pin flask to version 2.2.5 or 2.3.2
Introduced through: project@0.0.0 › flask-cors@3.0.10 › flask@2.1.2
Fix: Pin flask to version 2.2.5 or 2.3.2

…and 2 more
Security information
Factors contributing to the scoring:

Snyk: [CVSS 7.5](https://security.snyk.io/vuln/SNYK-PYTHON-FLASK-5490129) - High Severity
NVD: Not available. NVD has not yet published its analysis.

Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview

Affected versions of this package are vulnerable to Information Exposure in the form of exposing the permanent session cookie, when all of the following conditions are met:

The application is hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.

The application sets session.permanent = True.

The application does not access or modify the session at any point during a request.

SESSION_REFRESH_EACH_REQUEST is enabled (the default).

The application does not set a Cache-Control header to indicate that a page is private or should not be cached.

A response containing data intended for one client may be cached and sent to other clients. If the proxy also caches Set-Cookie headers, it may send one client's session cookie to other clients. Under these conditions, the Vary: Cookie header is not set when a session is refreshed (re-sent to update the expiration) without being accessed or modified.

Action items:

  • Pin flask to version 2.2.5 or 2.3.2

Completion criteria:

  • Vulnerability is no longer flagged by snyk
@cnlucas cnlucas added Security: high Remediate within 30 days Security: general General security concern or issue labels May 10, 2023
@cnlucas cnlucas added this to the Sprint 21.5 milestone May 10, 2023
@cnlucas cnlucas mentioned this issue May 10, 2023
3 tasks
This was referenced May 17, 2023
@tmpayton tmpayton modified the milestones: Sprint 21.5, Sprint 21.6 May 25, 2023
@tmpayton tmpayton mentioned this issue May 31, 2023
2 tasks
This was referenced Jun 7, 2023
@djgarr djgarr modified the milestones: PI 21 innovation, Sprint 22.1 Jul 5, 2023
@pkfec pkfec mentioned this issue Jul 6, 2023
2 tasks
@pkfec pkfec mentioned this issue Jul 12, 2023
3 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: general General security concern or issue Security: high Remediate within 30 days
Projects
None yet
3 participants