
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-23385 affects all versions of the Flask-Security package, a security implementation for Flask applications. The vulnerability was discovered by Noam Moshe of Claroty and disclosed on May 18, 2021. The issue allows attackers to bypass URL validation in the getpostlogoutredirect and getpostloginredirect functions, enabling redirection to arbitrary URLs by providing multiple backslashes (e.g., \evil.com/path) (Snyk Vuln DB, Debian Security).
The vulnerability has a CVSS v3.1 base score of 6.1 (Medium). The vulnerability is only exploitable when using an alternative WSGI server other than Werkzeug, or when the default behavior of Werkzeug is modified using 'autocorrectlocationheader=False'. The issue stems from inconsistencies in URL parsing between different components of the application (Ubuntu Security, SecurityWeek).
When successfully exploited, this vulnerability allows attackers to bypass URL validation mechanisms and redirect users to arbitrary malicious websites. This can lead to potential phishing attacks or other malicious redirections that could compromise user security (Snyk Vuln DB).
Since Flask-Security is no longer maintained, there is no official fix available. Organizations using Flask-Security should consider migrating to alternative security implementations. For systems that must continue using Flask-Security, ensuring the use of Werkzeug as the WSGI server with default settings can help mitigate the vulnerability (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."