On Tue, 01 Sep 2020 10:51:48 +0200 Salvatore Bonaccorso
<car...@debian.org> wrote:
> The following vulnerability was published for python-flask-cors.
> 
> CVE-2020-25032[0]:
> | An issue was discovered in Flask-CORS (aka CORS Middleware for Flask)
> | before 3.0.9. It allows ../ directory traversal to access private
> | resources because resource matching does not ensure that pathnames are
> | in a canonical format.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2020-25032
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25032
> [1] 
> https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895

I have prepared a buster-security release at

https://salsa.debian.org/python-team/packages/python-flask-cors/-/tags/debian%2F3.0.7-2

The new upstream release is waiting in the master branch to be published
in sid.

Reply via email to