This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2021-06-10T23:20:10.252434Z

Updated: 2024-09-16T17:18:13.774Z

Reserved: 2021-01-08T00:00:00

Link: CVE-2021-23393

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-06-11T00:15:09.273

Modified: 2021-06-22T16:53:53.523

Link: CVE-2021-23393

cve-icon Redhat

No data.