CVE-2024-6839

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6839
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6839.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-6839
Aliases
Downstream
Related
Published
2025-03-20T10:15:33Z
Modified
2025-09-19T15:14:26.147762Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vulnerability. The plugin prioritizes longer regex patterns over more specific ones when matching paths, which can lead to less restrictive CORS policies being applied to sensitive endpoints. This mismatch in regex pattern priority allows unauthorized cross-origin access to sensitive data or functionality, potentially exposing confidential information and increasing the risk of unauthorized actions by malicious actors.

References

Affected packages

Git / github.com/corydolphin/flask-cors

Affected ranges

Type
GIT
Repo
https://github.com/corydolphin/flask-cors
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.10.0
1.10.1
1.10.2
1.10.3
1.8.1
1.9.0

2.*

2.0.0
2.0.0rc1
2.0.1
2.1.0
2.1.1
2.1.2
2.1.3

3.*

3.0.0
3.0.1
3.0.10
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.0.9
3.1.01

4.*

4.0.0
4.0.1

v1.*

v1.1
v1.1.1
v1.1.2
v1.1.3
v1.2.0
v1.2.1
v1.3.0
v1.3.1
v1.4.0
v1.6.0
v1.6.1
v1.7.0
v1.7.2
v1.7.3
v1.7.4
v1.8.0