Vulnerability Description
An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webargs Project | Webargs | < 5.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/marshmallow-code/webargs/issues/371ExploitIssue TrackingThird Party Advisory
- https://webargs.readthedocs.io/en/latest/changelog.htmlRelease NotesThird Party Advisory
- https://github.com/marshmallow-code/webargs/issues/371ExploitIssue TrackingThird Party Advisory
- https://webargs.readthedocs.io/en/latest/changelog.htmlRelease NotesThird Party Advisory
FAQ
What is CVE-2019-9710?
CVE-2019-9710 is a vulnerability with a CVSS score of 8.1 (HIGH). An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meanin...
How severe is CVE-2019-9710?
CVE-2019-9710 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9710?
Check the references section above for vendor advisories and patch information. Affected products include: Webargs Project Webargs.