logo

CVE-2022-31177 flask-appbuilder

Package

Manager: pip
Name: flask-appbuilder
Vulnerable Version: >=0 <4.1.3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00361 pctl0.57501

Details

Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings ### Impact An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users. Only when using `AUTH_DB` database authentication option. ### Patches Fixed on 4.1.3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)

Metadata

Created: 2022-07-29T22:28:12Z
Modified: 2025-03-07T19:09:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-32ff-4g79-vgfc/GHSA-32ff-4g79-vgfc.json
CWE IDs: ["CWE-200", "CWE-916"]
Alternative ID: GHSA-32ff-4g79-vgfc
Finding: F052
Auto approve: 1