CVE-2022-31177

Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users. This issue has been fixed in version 4.1.3. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dpgaspar:flask-appbuilder:*:*:*:*:*:*:*:*

History

07 Mar 2025, 14:37

Type Values Removed Values Added
First Time Dpgaspar
Dpgaspar flask-appbuilder
CPE cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:* cpe:2.3:a:dpgaspar:flask-appbuilder:*:*:*:*:*:*:*:*

Information

Published : 2022-08-01 19:15

Updated : 2025-03-07 14:37


NVD link : CVE-2022-31177

Mitre link : CVE-2022-31177

CVE.ORG link : CVE-2022-31177


JSON object : View

Products Affected

dpgaspar

  • flask-appbuilder
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-Other