An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v3rg-qm46-xrg9 | Path traversal in flaskcode |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md |
|
History
Thu, 14 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-17T15:10:22.000Z
Reserved: 2023-12-31T00:00:00.000Z
Link: CVE-2023-52289
Updated: 2024-08-02T22:55:41.263Z
Status : Modified
Published: 2024-01-13T04:15:08.240
Modified: 2025-06-17T16:15:31.303
Link: CVE-2023-52289
No data.
OpenCVE Enrichment
No data.
Github GHSA