PyPi: Flask-Appbuilder

CVE-2022-31177

Safety vulnerability ID: 50436

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Aug 01, 2022 Updated at Feb 23, 2024
Scan your Python projects for vulnerabilities →

Advisory

Flask-AppBuilder 4.1.3 includes a fix for CVE-2022-31177: Possible to infer sensitive information through query strings.
https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-32ff-4g79-vgfc

Affected package

flask-appbuilder

Latest version: 4.4.1

Simple and rapid application development framework, built on top of Flask. includes detailed security, auto CRUD generation for your models, google charts and much more.

Affected versions

Fixed versions

Vulnerability changelog

Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users. This issue has been fixed in version 4.1.3. Users are advised to upgrade. There are no known workarounds for this issue. See CVE-2022-31177.


CONFIRM:https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-32ff-4g79-vgfc: https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-32ff-4g79-vgfc
MISC:https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.1.3: https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.1.3

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

LOW 2.7

CVSS v3 Details

LOW 2.7
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
HIGH
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
LOW
Integrity Impact (I)
NONE
Availability Availability (A)
NONE