CVE-2024-6866

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6866
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-6866.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-6866
Aliases
Related
Published
2025-03-20T10:15:34Z
Modified
2025-03-21T22:36:48.493292Z
Summary
[none]
Details

corydolphin/flask-cors version 4.01 contains a vulnerability where the request path matching is case-insensitive due to the use of the try_match function, which is originally intended for matching hosts. This results in a mismatch because paths in URLs are case-sensitive, but the regex matching treats them as case-insensitive. This misconfiguration can lead to significant security vulnerabilities, allowing unauthorized origins to access paths meant to be restricted, resulting in data exposure and potential data leaks.

References

Affected packages

Debian:11 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.9-2
3.0.10-1
3.0.10-2

4.*

4.0.0-1
4.0.1-1

5.*

5.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.10-2

4.*

4.0.0-1
4.0.1-1

5.*

5.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-flask-cors

Package

Name
python-flask-cors
Purl
pkg:deb/debian/python-flask-cors?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.10-2

4.*

4.0.0-1
4.0.1-1

5.*

5.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}