CVE-2023-23934

Summary

CVECVE-2023-23934
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-02-14 20:15:00 UTC
Updated2023-08-18 14:15:00 UTC
DescriptionWerkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.

Risk And Classification

Problem Types: CWE-20

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Palletsprojects Werkzeug All All All All

References

ReferenceSourceLinkTags
Release 2.2.3 · pallets/werkzeug · GitHub MISC github.com
Merge pull request from GHSA-px8h-6qxv-m22q · pallets/werkzeug@cf275f4 · GitHub MISC github.com
February 2023 Werkzeug Vulnerabilities in NetApp Products | NetApp Product Security MISC security.netapp.com
cookie prefixed with `=` can shadow unprefixed cookie · Advisory · pallets/werkzeug · GitHub MISC github.com
Debian -- Security Information -- DSA-5470-1 python-werkzeug MISC www.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160842 Oracle Enterprise Linux Security Update for python-werkzeug (ELSA-2023-12709)
  • 181616 Debian Security Update for python-werkzeug (DLA 3346-1)
  • 182278 Debian Security Update for python-werkzeug (CVE-2023-23934)
  • 199235 Ubuntu Security Notification for Werkzeug Vulnerabilities (USN-5948-1)
  • 199431 Ubuntu Security Notification for Werkzeug Vulnerabilities (USN-5948-2)
  • 283790 Fedora Security Update for mingw (FEDORA-2023-af75e27098)
  • 284255 Fedora Security Update for mingw (FEDORA-2023-8d94dccc7e)
  • 355112 Amazon Linux Security Advisory for python-werkzeug : ALAS2023-2023-149
  • 6000024 Debian Security Update for python-werkzeug (DSA 5470-1)
  • 673119 EulerOS Security Update for python-werkzeug (EulerOS-SA-2023-2167)
  • 905561 Common Base Linux Mariner (CBL-Mariner) Security Update for python-werkzeug (13589)
  • 906614 Common Base Linux Mariner (CBL-Mariner) Security Update for python-werkzeug (13589-3)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report