CVE-2024-6221

A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:corydolphin:flask-cors:4.0.1:*:*:*:*:*:*:*

History

07 Apr 2025, 15:15

Type Values Removed Values Added
References
  • () https://github.com/corydolphin/flask-cors/commit/03aa3f8e2256437f7bad96422a747b98ab5e31bf -
Summary (en) A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default, without any configuration option. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions. (en) A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions.

Information

Published : 2024-08-18 19:15

Updated : 2025-04-07 15:15


NVD link : CVE-2024-6221

Mitre link : CVE-2024-6221

CVE.ORG link : CVE-2024-6221


JSON object : View

Products Affected

corydolphin

  • flask-cors
CWE
CWE-284

Improper Access Control

NVD-CWE-Other