
Cloud Vulnerability DB
A community-led vulnerabilities database
FreeTAKServer version 1.9.8 was found to contain a hardcoded Flask secret key vulnerability (CVE-2022-25510), discovered and disclosed on February 21, 2022. This security flaw affects the authentication mechanism of the FreeTAKServer application (NVD, CVE).
The vulnerability stems from hardcoded Flask secret keys in three different locations within the source code. Flask uses these secret keys to sign client sessions, which should typically be defined in environment variables rather than hardcoded in the application. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability allows attackers to craft their own cookies using tools like Flask-Unsign to manipulate user identifiers and potentially escalate privileges to administrator level (UID 1). Additionally, when multiple Flask servers use the same secret key, attackers can reuse authentication cookies across different servers, enabling lateral movement and authentication bypass (GitHub Issue).
The recommended mitigation is to update the Flask secret keys to be dynamically generated or stored in environment variables rather than hardcoded in the application code. This prevents predictable secret keys and ensures each server instance has unique authentication signatures (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."