CVE-2023-30861
Podman vulnerability analysis and mitigation

Overview

CVE-2023-30861 is a security vulnerability in Flask, a lightweight WSGI web application framework. The vulnerability was discovered in May 2023 and affects Flask versions prior to 2.3.2 and 2.2.5. The issue occurs when Flask fails to properly set the Vary: Cookie header when the session is refreshed without being accessed or modified, potentially leading to the disclosure of permanent session cookies (Flask Advisory).

Technical details

The vulnerability has a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The issue manifests when specific conditions are met: the application must be hosted behind a caching proxy that doesn't strip cookies, session.permanent is set to True, the session isn't accessed during a request, SESSION_REFRESH_EACH_REQUEST is enabled (default), and no Cache-Control header is set to prevent caching (Flask Advisory).

Impact

When successfully exploited, this vulnerability could lead to the disclosure of sensitive information. Specifically, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches Set-Cookie headers, it may send one client's session cookie to other clients, potentially compromising session security (NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Flask versions 2.3.2 and 2.2.5. Organizations are recommended to upgrade to these patched versions to address the security issue. For systems that cannot be immediately updated, ensuring proper Cache-Control headers are set or modifying the session access pattern could help mitigate the risk (Red Hat Advisory).

Community reactions

Multiple major organizations and Linux distributions have responded to this vulnerability by issuing security advisories and patches, including Red Hat, Debian, and NetApp. Debian released security updates for both oldstable (bullseye) and LTS distributions (Debian Advisory, Debian LTS).

Additional resources


SourceThis report was generated using AI

Related Podman vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66506HIGH7.5
  • PodmanPodman
  • container-tools:rhel8::buildah
NoYesDec 04, 2025
CVE-2025-65637HIGH7.5
  • cAdvisorcAdvisor
  • aws-flb-kinesis
NoYesDec 04, 2025
CVE-2025-61729HIGH7.5
  • cAdvisorcAdvisor
  • cert-manager-1.19
NoYesDec 02, 2025
CVE-2025-67499MEDIUM6.6
  • DockerDocker
  • container-tools:rhel8::containernetworking-plugins
NoYesDec 10, 2025
CVE-2025-61727MEDIUM6.5
  • cAdvisorcAdvisor
  • toolbox
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management