CVE-2024-34069Cross-Site Request Forgery in Werkzeug

Severity
7.5HIGHNVD
EPSS
38.9%
top 2.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateJul 15

Description

Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's applicatio

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages3 packages

CVEListV5pallets/werkzeug< 3.0.3

Also affects: Debian Linux 11.0, Fedora 38, 40

Patches

🔴Vulnerability Details

4
CVEList
Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution2024-05-06
OSV
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain2024-05-06
OSV
CVE-2024-34069: Werkzeug is a comprehensive WSGI web application library2024-05-06
GHSA
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain2024-05-06

📋Vendor Advisories

5
Oracle
Oracle Oracle Communications Risk Matrix: Install (Werkzeug) — CVE-2024-340692024-07-15
Ubuntu
Werkzeug vulnerability2024-05-29
Microsoft
Werkzeug's improper usage of a pathname and improper CSRF protection results in the remote command execution2024-05-14
Red Hat
python-werkzeug: user may execute code on a developer's machine2024-05-06
Debian
CVE-2024-34069: python-werkzeug - Werkzeug is a comprehensive WSGI web application library. The debugger in affect...2024
CVE-2024-34069 — Cross-Site Request Forgery in Werkzeug | cvebase