CVE-2022-31177 – flask-appbuilder
Package
Manager: pip
Name: flask-appbuilder
Vulnerable Version: >=0 <4.1.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00361 pctl0.57501
Details
Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings ### Impact An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users. Only when using `AUTH_DB` database authentication option. ### Patches Fixed on 4.1.3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
Metadata
Created: 2022-07-29T22:28:12Z
Modified: 2025-03-07T19:09:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-32ff-4g79-vgfc/GHSA-32ff-4g79-vgfc.json
CWE IDs: ["CWE-200", "CWE-916"]
Alternative ID: GHSA-32ff-4g79-vgfc
Finding: F052
Auto approve: 1