-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Security Vulnerabilities in Flower: OAuth Authentication Bypass and Lack of CSRF Protections (CVE-2022-30034) #1217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@mher FYI! |
Actually flower has an option for CRSF protection https://flower.readthedocs.io/en/latest/config.html#cookie-secret
The vulnerabilities mentioned in the article can be prevented by more strict regular expressions. For example, |
Created a pull request to improve security #1227 please review |
Released a new version https://pypi.org/project/flower/1.2.0/ |
pip-audit still complains here:
|
@sebastian-philipp I've submitted an update to MITRE to have them mark the entry as fixed as of 1.2.0. It tends to take them some time to respond, but after they update the entry I think pip-audit should hopefully be able to notice it's fixed. |
@tprynn by chance, do you know why we're still seeing the same error with pip-audit?
|
@sebastian-philipp I'm sorry, I don't know exactly how the version info flows through the various DBs. Looking at pip-audit's docs it seems like the source should be https://github.com/pypa/advisory-database but I didn't find any reference to the CVE / IDs there. I did submit a change to Github's advisory DB in case it's there: github/advisory-database#666 |
No worries. I'm just super grateful for you work. |
Ref: https://tprynn.github.io/2022/05/26/flower-vulns.html
auth_regex
restrictionDue to a lack of response from the maintainer, these issues were publicly disclosed on 26 May 2022 along with a PR (#1216)
The text was updated successfully, but these errors were encountered: