{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6221","assignerOrgId":"c09c270a-b464-47c1-9133-acb35b22c19a","state":"PUBLISHED","assignerShortName":"@huntr_ai","dateReserved":"2024-06-20T18:32:12.417Z","datePublished":"2024-08-18T18:58:20.551Z","dateUpdated":"2025-04-07T15:03:37.262Z"},"containers":{"cna":{"title":"Improper Access Control in corydolphin/flask-cors","providerMetadata":{"orgId":"c09c270a-b464-47c1-9133-acb35b22c19a","shortName":"@huntr_ai","dateUpdated":"2025-04-07T15:03:37.262Z"},"descriptions":[{"lang":"en","value":"A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Access-Control-Allow-Private-Network` CORS header to be set to true by default. This behavior can expose private network resources to unauthorized external access, leading to significant security risks such as data breaches, unauthorized access to sensitive information, and potential network intrusions."}],"affected":[{"vendor":"corydolphin","product":"corydolphin/flask-cors","versions":[{"version":"unspecified","lessThan":"5.0.0","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d"},{"url":"https://github.com/corydolphin/flask-cors/commit/03aa3f8e2256437f7bad96422a747b98ab5e31bf"}],"metrics":[{"cvssV3_0":{"version":"3.0","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284"}]}],"source":{"advisory":"a42935fc-6f57-4818-bca4-3d528235df4d","discovery":"EXTERNAL"}},"adp":[{"affected":[{"vendor":"corydolphin","product":"flask-cors","cpes":["cpe:2.3:a:corydolphin:flask-cors:4.0.1:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.0.1","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-19T13:46:09.049560Z","id":"CVE-2024-6221","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-19T13:48:13.411Z"}}]}}