[Buildroot] [PATCH] package/python-flask-cors: security bump to v6.0.1
Peter Korsgaard
peter at korsgaard.com
Wed Sep 3 16:16:16 UTC 2025
>>>>> "Titouan" == Titouan Christophe via buildroot <buildroot at buildroot.org> writes:
> This is a major version bump, because it could break user code that depends
> on the (wrong) previous logic fixed by the new release
> See the release notes:
> - https://github.com/corydolphin/flask-cors/releases/tag/6.0.0
> - https://github.com/corydolphin/flask-cors/releases/tag/6.0.1
> This fixes the following vulnerabilties:
> - CVE-2024-6839:
> corydolphin/flask-cors version 4.0.1 contains an improper regex path
> matching vulnerability. The plugin prioritizes longer regex patterns
> over more specific ones when matching paths, which can lead to less
> restrictive CORS policies being applied to sensitive endpoints. This
> mismatch in regex pattern priority allows unauthorized cross-origin
> access to sensitive data or functionality, potentially exposing
> confidential information and increasing the risk of unauthorized
> actions by malicious actors.
> https://www.cve.org/CVERecord?id=CVE-2024-6839
> - CVE-2024-6844:
> A vulnerability in corydolphin/flask-cors version 4.0.1 allows for
> inconsistent CORS matching due to the handling of the '+' character in
> URL paths. The request.path is passed through the unquote_plus
> function, which converts the '+' character to a space ' '. This
> behavior leads to incorrect path normalization, causing potential
> mismatches in CORS configuration. As a result, endpoints may not be
> matched correctly to their CORS settings, leading to unexpected CORS
> policy application. This can cause unauthorized cross-origin access or
> block valid requests, creating security vulnerabilities and usability
> issues.
> https://www.cve.org/CVERecord?id=CVE-2024-6844
> - CVE-2024-6866:
> corydolphin/flask-cors version 4.01 contains a vulnerability where the
> request path matching is case-insensitive due to the use of the
> `try_match` function, which is originally intended for matching hosts.
> This results in a mismatch because paths in URLs are case-sensitive,
> but the regex matching treats them as case-insensitive. This
> misconfiguration can lead to significant security vulnerabilities,
> allowing unauthorized origins to access paths meant to be restricted,
> resulting in data exposure and potential data leaks.
> https://www.cve.org/CVERecord?id=CVE-2024-6866
> Signed-off-by: Titouan Christophe <titouan.christophe at mind.be>
Committed, thanks.
--
Bye, Peter Korsgaard
More information about the buildroot
mailing list