flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
References
Link | Resource |
---|---|
https://webargs.readthedocs.io/en/latest/changelog.html | Release Notes Vendor Advisory |
https://webargs.readthedocs.io/en/latest/changelog.html | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://webargs.readthedocs.io/en/latest/changelog.html - Release Notes, Vendor Advisory |
Information
Published : 2020-01-29 15:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7965
Mitre link : CVE-2020-7965
CVE.ORG link : CVE-2020-7965
JSON object : View
Products Affected
webargs_project
- webargs
CWE
CWE-352
Cross-Site Request Forgery (CSRF)