Vulnerability Description
corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Corydolphin | Flask-Cors | 4.0.0 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644ExploitThird Party Advisory
- https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00049.html
FAQ
What is CVE-2024-1681?
CVE-2024-1681 is a vulnerability with a CVSS score of 5.3 (MEDIUM). corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containin...
How severe is CVE-2024-1681?
CVE-2024-1681 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1681?
Check the references section above for vendor advisories and patch information. Affected products include: Corydolphin Flask-Cors.