Bug ID | 1106279 |
---|---|
Summary | VUL-1: CVE-2018-1000656 python-flask: Improper Input Validation via crafted JSON file |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.3 |
Hardware | Other |
URL | https://smash.suse.de/issue/213087/ |
OS | Other |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Other |
Assignee | mimi.vx@gmail.com |
Reporter | meissner@suse.com |
QA Contact | security-team@suse.de |
CC | petr@cervinka.net |
Found By | Security Response Team |
Blocker | --- |
rh#1623131 The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. References: https://bugzilla.redhat.com/show_bug.cgi?id=1623131 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000656 https://github.com/pallets/flask/pull/2691 https://github.com/pallets/flask/releases/tag/0.12.3