Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3346-1 | python-werkzeug security update |
Debian DSA |
DSA-5470-1 | python-werkzeug security update |
EUVD |
EUVD-2023-0281 | Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3. |
Github GHSA |
GHSA-px8h-6qxv-m22q | Incorrect parsing of nameless cookies leads to __Host- cookies bypass |
Ubuntu USN |
USN-5948-1 | Werkzeug vulnerabilities |
Ubuntu USN |
USN-5948-2 | Werkzeug vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Jun 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:ceph_storage:8.1::el9 |
Thu, 08 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat ceph Storage
|
|
| CPEs | cpe:/a:redhat:ceph_storage:7.1::el8 | |
| Vendors & Products |
Redhat ceph Storage
|
Mon, 10 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:11:36.910Z
Reserved: 2023-01-19T21:12:31.360Z
Link: CVE-2023-23934
Updated: 2024-08-02T10:49:07.628Z
Status : Modified
Published: 2023-02-14T20:15:17.370
Modified: 2024-11-21T07:47:07.947
Link: CVE-2023-23934
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN