Vulnerability Description
Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Palletsprojects | Werkzeug | < 0.11.11 |
Related Weaknesses (CWE)
References
- http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/Issue Tracking
- https://github.com/pallets/werkzeug/pull/1001Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html
- http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/Issue Tracking
- https://github.com/pallets/werkzeug/pull/1001Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html
FAQ
What is CVE-2016-10516?
CVE-2016-10516 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote ...
How severe is CVE-2016-10516?
CVE-2016-10516 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10516?
Check the references section above for vendor advisories and patch information. Affected products include: Palletsprojects Werkzeug.