Filtered by vendor Webargs Project
Subscribe
Total
2 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-7965 | 1 Webargs Project | 1 Webargs | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF. | |||||
CVE-2019-9710 | 1 Webargs Project | 1 Webargs | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests. |