CVEID: CVE-2022-29361 DESCRIPTION: Pallets Werkzeug is vulnerable to HTTP request smuggling, caused by improper parsing of HTTP requests.By sending a specially-crafted HTTP request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks. : CVE-2009-1234 or 2010-1234 or 20101234) . \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. None. CVE(s): CVE-2022-29361 Affected product(s) and affected version(s): Affected Product(s) Version(s) IBM Spectrum Protect Plus File Systems Agent 10.1.6-10.1.11 Refer to the following reference URLs for remediation and additional vulnerability details: Source . A curated repository of vetted computer software exploits and exploitable vulnerabilities. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. An attacker could use this issue to access sensitive information. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/165078]() for the current score. (CVE-2020-28724)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. (CVE-2020-28724)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. View Analysis Description Severity CVSS Version 3.x CVSS Version 2.0. Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)\n\n## Affected Products and Versions\n\nAffected Product(s) | Version(s) \n---|--- \nIBM Watson Machine Learning Community Edition | 1.6.1 \nIBM PowerAI | 1.6.0 \n \n## Remediation/Fixes\n\nWerkzeug has been upgraded in PowerAI 1.6.2 to a level that addresses this vulnerability.\n\n## Workarounds and Mitigations\n\nNone\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v3 Guide]( \"Link resides outside of ibm.com\" ) \n[On-line Calculator v3]( \"Link resides outside of ibm.com\" )\n\nOff \n\n## Related Information\n\n[IBM Secure Engineering Web Portal]() \n[IBM Product Security Incident Response Blog]()\n\n## Change History\n\n19 Dec 2019: Initial Publication\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. This does not include vulnerabilities belonging to this package's dependencies. Search results are not available at this time. get ('WERKZEUG_DEBUG_PIN') Security Advisory Services. SKILLS & ADVANCEMENT. **Note:** Flask-Security is not maintained anymore. ", "edition": 1, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-08-09T15:15:00", "type": "osv", "title": "PYSEC-2019-140", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14806"], "modified": "2019-09-11T00:15:00", "id": "OSV:PYSEC-2019-140", "href": "https://osv.dev/vulnerability/PYSEC-2019-140", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "github": [{"lastseen": "2022-08-13T05:00:15", "description": "Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. Close. Snyk scans for vulnerabilities and provides fixes for free. (CVE-2016-10516)\n\n - Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. Modified date: Werkzeug did not have any published security vulnerabilities last year. Vulnerability statistics provide a quick overview for security vulnerabilities of . preg(pattern:\"^(16\\.04|18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04', 'Ubuntu ' + release);\nif ( ! preg(pattern:\"^(16\\.04|18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04', 'Ubuntu ' + release);\nif ( ! Training & Certification. An attacker could exploit the vulnerability to redirect users to an arbitrary url via a double slash in the URL. Second, set up a background payload listener. ", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2021-11-11T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : python-werkzeug (EulerOS-SA-2021-2671)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10516", "CVE-2020-28724"], "modified": "2021-11-11T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:python-werkzeug", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2021-2671.NASL", "href": "https://www.tenable.com/plugins/nessus/155290", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155290);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/11\");\n\n script_cve_id(\"CVE-2016-10516\", \"CVE-2020-28724\");\n\n script_name(english:\"EulerOS 2.0 SP5 : python-werkzeug (EulerOS-SA-2021-2671)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the python-werkzeug package installed, the EulerOS installation on the remote host is\naffected by the following vulnerabilities :\n\n - Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger\n in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers\n to inject arbitrary web script or HTML via a field that contains an exception message. Werkzeug is a comprehensive WSGI web application library for the Python language. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. (CVE-2016-10516)\n\n - Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-11-19T00:00:00", "type": "cnvd", "title": "werkzeug redirect vulnerability", "bulletinFamily": "cnvd", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-28724"], "modified": "2022-01-25T00:00:00", "id": "CNVD-2022-06544", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2022-06544", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}], "openvas": [{"lastseen": "2020-01-31T16:47:37", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2019-09-11T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for python-Werkzeug (openSUSE-SU-2019:2118-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14806"], "modified": "2020-01-31T00:00:00", "id": "OPENVAS:1361412562310852698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852698", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Several security issues were fixed in Werkzeug. This does not include vulnerabilities belonging to this package's dependencies. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. The vulnerability exists as the Docker containers uses the same machine ID.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-08-13T04:28:46", "type": "veracode", "title": "Insecure Randomness", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14806"], "modified": "2019-09-11T05:51:57", "id": "VERACODE:21185", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-21185/summary", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "osv": [{"lastseen": "2022-09-19T03:23:06", "description": "Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. (CVE-2019-14806), It was discovered that Werkzeug incorrectly handled certain URLs. Subscribe to My Notifications to be notified of important product support alerts like this. Please try again later or use one of the other support options on this page. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2019-08-21T16:15:24", "type": "github", "title": "Insufficient Entropy in werkzeug", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14806"], "modified": "2021-08-17T21:13:25", "id": "GHSA-GQ9M-QVPX-68HC", "href": "https://github.com/advisories/GHSA-gq9m-qvpx-68hc", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "cnvd": [{"lastseen": "2022-11-04T14:43:10", "description": "Werkzeug is a comprehensive library for WSGI web applications. CVEID: CVE-2022-29361 DESCRIPTION: Pallets Werkzeug is vulnerable to HTTP request smuggling, caused by improper parsing of HTTP requests. A Werkzeug security update has been released for Ubuntu 16.04 LTS and 18.04 LTS. Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before .11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message. Using werkzeug_debug_rce against multiple hosts But it looks like this is a remote exploit module, which means you can also engage multiple hosts. Based on project statistics from the GitHub repository for the PyPI package Werkzeug, we found that it has been starred 6,202 times, and that 0 other projects in the ecosystem are dependent on it. (CVE-2019-14806) It was discovered that Werkzeug incorrectly handled certain URLs. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. 24/7 MONITORING & REMEDIATION FROM MDR EXPERTS. If it is valid, then whatever/whichever file an attacker wants to see they can easily access it. Do not use the DebuggedApplication on the production servers. The text\n# itself is copyright (C) Canonical, Inc. See\n# . Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(143430);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/11\");\n\n script_cve_id(\"CVE-2019-14806\", \"CVE-2020-28724\");\n script_xref(name:\"USN\", value:\"4655-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS : Werkzeug vulnerabilities (USN-4655-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the USN-4655-1 advisory.\n\n - Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because\n Docker containers share the same machine id. get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\n\npkgs = [\n {'osver': '16.04', 'pkgname': 'python-werkzeug', 'pkgver': '0.10.4+dfsg1-1ubuntu1.2'},\n {'osver': '16.04', 'pkgname': 'python3-werkzeug', 'pkgver': '0.10.4+dfsg1-1ubuntu1.2'},\n {'osver': '18.04', 'pkgname': 'python-werkzeug', 'pkgver': '0.14.1+dfsg1-1ubuntu0.1'},\n {'osver': '18.04', 'pkgname': 'python3-werkzeug', 'pkgver': '0.14.1+dfsg1-1ubuntu0.1'}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n osver = NULL;\n pkgname = NULL;\n pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'python-werkzeug / python3-werkzeug');\n}", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-11-12T23:46:02", "description": "According to the versions of the python-werkzeug package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message. (CVE-2020-28724)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Application Security. \nAn attacker could use this issue to access sensitive information. It generally refers to an inclusion attack where an attacker can supply a valid input to get a response from a web server. Werkzeug comes with an intuitive debugger console that accepts Python scripts. OTHER SERVICES; Security Advisory Services. 25th October, 2017 python-werkzeug vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Werkzeug could be made to run arbitrary code if it opened a specially crafted file. Palletsprojects Werkzeug security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions (e.g. ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-08-09T15:15:00", "type": "debiancve", "title": "CVE-2019-14806", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14806"], "modified": "2019-08-09T15:15:00", "id": "DEBIANCVE:CVE-2019-14806", "href": "https://security-tracker.debian.org/tracker/CVE-2019-14806", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "veracode": [{"lastseen": "2022-07-26T16:30:57", "description": "werkzeug is vulnerable to open redirection. Werkzeug provides a WSGI middleware that renders nice tracebacks, optionally with an interactive debug console to execute code in any frame. QUICK-START & CONFIGURATION. werkzeug versions prior to 0.11.6 are vulnerable to redirection. SCAN MANAGEMENT & VULNERABILITY VALIDATION. An attacker is able to redirect a user to a malicious site via double slashes in the URL.\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-11-19T06:02:13", "type": "veracode", "title": "Open Redirection", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-28724"], "modified": "2020-12-01T18:17:43", "id": "VERACODE:27924", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-27924/summary", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2022-07-27T10:51:47", "description": "werkzeug is vulnerable to insecure randomness. ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2020-11-18T15:15:00", "type": "cve", "title": "CVE-2020-28724", "cwe": ["CWE-601"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-28724"], "modified": "2020-12-01T16:05:00", "cpe": [], "id": "CVE-2020-28724", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28724", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}, "cpe23": []}, {"lastseen": "2022-03-23T20:37:55", "description": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. the issue arises when debugging is enabled in a production environment. (CVE-2020-28724). ", "edition": 1, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-08-21T16:15:24", "type": "osv", "title": "Insufficient Entropy in werkzeug", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-14806"], "modified": "2022-09-15T23:54:15", "id": "OSV:GHSA-GQ9M-QVPX-68HC", "href": "https://osv.dev/vulnerability/GHSA-gq9m-qvpx-68hc", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-05-12T01:32:52", "description": "Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. The text\n# itself is copyright (C) Canonical, Inc. See\n# . Werkzeug is a comprehensive library for WSGI web applications. ", "cvss3": {"score": 7.5, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "published": "2020-12-02T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS / 18.04 LTS : Werkzeug vulnerabilities (USN-4655-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14806", "CVE-2020-28724"], "modified": "2022-05-11T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:python-werkzeug", "p-cpe:/a:canonical:ubuntu_linux:python3-werkzeug"], "id": "UBUNTU_USN-4655-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143430", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4655-1. (CVE-2019-14806)\n\n - Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. . Use Vulners API to create your own security tool API usage cases Network scanning Linux Patch management : CVE-2009-1234 or 2010-1234 or 20101234) . Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. (CVE-2019-14806)\n\n - Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. USN-3463-1: Werkzeug vulnerability 25 October 2017 Werkzeug could be made to run arbitrary code if it opened a specially crafted file. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
What Happened In The 2nd Millennium, Drome Racers Soundtrack, Crystal Oscillator Frequency, Myofascial Releaser Cupping Set, Random Football Team Generator Fifa 19, Is Norway's Economy Good, Shareplum Python Github,