
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in corydolphin/flask-cors version 4.0.1 where the Access-Control-Allow-Private-Network CORS header is set to true by default, without any configuration option. This security flaw was assigned CVE-2024-6221 and was published on August 18, 2024. The vulnerability received a CVSS v3.1 base score of 7.5 (HIGH) from NIST and 6.5 (MEDIUM) from huntr.dev (NVD Database).
The vulnerability stems from the default configuration of the Access-Control-Allow-Private-Network CORS header being set to true without providing users the ability to configure this setting. The severity assessment varies between sources, with NIST assigning a CVSS v3.1 vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (7.5 HIGH), while huntr.dev rates it as CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N (6.5 MEDIUM). The vulnerability is classified under CWE-284 (Improper Access Control) (NVD Database).
The vulnerability can expose private network resources to unauthorized external access. This exposure could potentially lead to significant security risks including data breaches, unauthorized access to sensitive information, and potential network intrusions (NVD Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."