{"api_version":"1","generated_at":"2026-04-22T22:49:22+00:00","cve":"CVE-2018-1000656","urls":{"html":"https://cve.report/CVE-2018-1000656","api":"https://cve.report/api/cve/CVE-2018-1000656.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-1000656","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000656"},"summary":{"title":"CVE-2018-1000656","description":"The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-08-20 19:31:00","updated_at":"2020-06-09 22:15:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://usn.ubuntu.com/4378-1/","name":"USN-4378-1","refsource":"UBUNTU","tags":[],"title":"USN-4378-1: Flask vulnerability | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/pallets/flask/pull/2691","name":"https://github.com/pallets/flask/pull/2691","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"detect UTF encodings when loading json by davidism · Pull Request #2691 · pallets/flask · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html","name":"[debian-lts-announce] 20190820 [SECURITY] [DLA 1892-1] flask security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 1892-1] flask security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/pallets/flask/releases/tag/0.12.3","name":"https://github.com/pallets/flask/releases/tag/0.12.3","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Release 0.12.3 · pallets/flask · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20190221-0001/","name":"https://security.netapp.com/advisory/ntap-20190221-0001/","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"CVE-2018-1000656 Flask Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-1000656","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000656","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"hyper_converged_infrastructure","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"hyper_converged_infrastructure","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"ontap_select_deploy_utility","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"ontap_select_deploy_utility","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"palletsprojects","cpe5":"flask","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"1000656","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"palletsprojects","cpe5":"flask","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-1000656","qid":"981304","title":"Python (pip) Security Update for flask (GHSA-562c-5r94-xh97)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","DATE_ASSIGNED":"2018-08-19T17:09:33.130462","DATE_REQUESTED":"2018-08-15T16:18:15","ID":"CVE-2018-1000656","REQUESTER":"secure@veritas.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://security.netapp.com/advisory/ntap-20190221-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20190221-0001/"},{"name":"https://github.com/pallets/flask/pull/2691","refsource":"CONFIRM","url":"https://github.com/pallets/flask/pull/2691"},{"name":"https://github.com/pallets/flask/releases/tag/0.12.3","refsource":"CONFIRM","url":"https://github.com/pallets/flask/releases/tag/0.12.3"},{"refsource":"MLIST","name":"[debian-lts-announce] 20190820 [SECURITY] [DLA 1892-1] flask security update","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html"},{"refsource":"UBUNTU","name":"USN-4378-1","url":"https://usn.ubuntu.com/4378-1/"}]}},"nvd":{"publishedDate":"2018-08-20 19:31:00","lastModifiedDate":"2020-06-09 22:15:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:palletsprojects:flask:*:*:*:*:*:*:*:*","versionEndExcluding":"0.12.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:ontap_select_deploy_utility:*:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:hyper_converged_infrastructure:*:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:active_iq:*:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"1000656","Ordinal":"132356","Title":"CVE-2018-1000656","CVE":"CVE-2018-1000656","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"1000656","Ordinal":"1","NoteData":"The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"1000656","Ordinal":"2","NoteData":"2018-08-20","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"1000656","Ordinal":"3","NoteData":"2020-06-09","Type":"Other","Title":"Modified"}]}}}