Skip to content

Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error

Low severity GitHub Reviewed Published Jun 22, 2023 in dpgaspar/Flask-AppBuilder • Updated Sep 20, 2024

Package

pip Flask-AppBuilder (pip)

Affected versions

< 4.3.2

Patched versions

4.3.2

Description

Impact

An authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password.

Patches

Fixed on 4.3.2

References

@dpgaspar dpgaspar published to dpgaspar/Flask-AppBuilder Jun 22, 2023
Published to the GitHub Advisory Database Jun 22, 2023
Reviewed Jun 22, 2023
Published by the National Vulnerability Database Jun 22, 2023
Last updated Sep 20, 2024

Severity

Low

EPSS score

0.088%
(39th percentile)

Weaknesses

CVE ID

CVE-2023-34110

GHSA ID

GHSA-jhpr-j7cq-3jp3

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.