CVE-2020-7965

flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
References
Link Resource
https://webargs.readthedocs.io/en/latest/changelog.html Release Notes Vendor Advisory
https://webargs.readthedocs.io/en/latest/changelog.html Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webargs_project:webargs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://webargs.readthedocs.io/en/latest/changelog.html - Release Notes, Vendor Advisory () https://webargs.readthedocs.io/en/latest/changelog.html - Release Notes, Vendor Advisory

Information

Published : 2020-01-29 15:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-7965

Mitre link : CVE-2020-7965

CVE.ORG link : CVE-2020-7965


JSON object : View

Products Affected

webargs_project

  • webargs
CWE
CWE-352

Cross-Site Request Forgery (CSRF)