CVE-2023-23934
Published on: Not Yet Published
Last Modified on: 02/23/2023 10:31:00 PM UTC
Certain versions of Werkzeug from Palletsprojects contain the following vulnerability:
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.
- CVE-2023-23934 has been assigned by
[email protected] to track the vulnerability - currently rated as LOW severity.
- Affected Vendor/Software:
pallets - werkzeug version = < 2.2.3
CVSS3 Score: 3.5 - LOW
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
ADJACENT_NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Release 2.2.3 · pallets/werkzeug · GitHub | github.com text/html |
![]() |
Merge pull request from GHSA-px8h-6qxv-m22q · pallets/[email protected] · GitHub | github.com text/html |
![]() |
cookie prefixed with `=` can shadow unprefixed cookie · Advisory · pallets/werkzeug · GitHub | github.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Palletsprojects | Werkzeug | All | All | All | All |
- cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-23934 | 2023-02-14 21:38:31 |