flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
                
            References
                    | Link | Resource | 
|---|---|
| https://webargs.readthedocs.io/en/latest/changelog.html | Release Notes Vendor Advisory | 
| https://webargs.readthedocs.io/en/latest/changelog.html | Release Notes Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-01-29 15:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7965
Mitre link : CVE-2020-7965
CVE.ORG link : CVE-2020-7965
JSON object : View
Products Affected
                webargs_project
- webargs
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
