Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0078 | Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.\n |
Github GHSA |
GHSA-jhpr-j7cq-3jp3 | Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error |
Fri, 06 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-06T15:28:20.356Z
Reserved: 2023-05-25T21:56:51.246Z
Link: CVE-2023-34110
Updated: 2024-08-02T16:01:53.900Z
Status : Modified
Published: 2023-06-22T23:15:09.410
Modified: 2024-11-21T08:06:34.153
Link: CVE-2023-34110
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA