CVE-2020-7965

flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
References
Link Resource
https://webargs.readthedocs.io/en/latest/changelog.html Release Notes Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:webargs_project:webargs:*:*:*:*:*:*:*:*

Information

Published : 2020-01-29 07:15

Updated : 2020-02-03 08:36


NVD link : CVE-2020-7965

Mitre link : CVE-2020-7965


JSON object : View

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

Advertisement

dedicated server usa

Products Affected

webargs_project

  • webargs