Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
Low
Attack Vector
Network
0

CVE-2024-22414

Disclosure Date: January 17, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

flaskBlog is a simple blog app built with Flask. Improper storage and rendering of the /user/<user> page allows a user’s comments to execute arbitrary javascript code. The html template user.html contains the following code snippet to render comments made by a user: <div class="content" tag="content">{{comment[2]|safe}}</div>. Use of the “safe” tag causes flask to not escape the rendered content. To remediate this, simply remove the |safe tag from the HTML above. No fix is is available and users are advised to manually edit their installation.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
5.4 Medium
Impact Score:
2.7
Exploitability Score:
2.3
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

Products

Additional Info

Technical Analysis