QID 671026

Date Published: 2021-11-24

QID 671026: EulerOS Security Update for python-werkzeug (EulerOS-SA-2021-2671)

Werkzeug started as simple collection of various utilities for WSGI applications and has become one of the most advanced WSGI utility modules.It includes a powerful debugger, full featured request and response objects, HTTP utilities to handle entity tags, cache control headers, HTTP dates, cookie handling, file uploads, a powerful URL routing system and a bunch of community contributed addon modules. Werkzeug is unicode aware and doesn't enforce a specific template engine, database adapter or anything else. It doesn't even enforce a specific way of handling requests and leaves all that up to the developer. It's most useful for end user applications which should work on as many server environments as possible (such as blogs, wikis,bulletin boards, etc.). Security Fix(es): Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.(CVE-2020-28724) Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.(CVE-2016-10516)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

An arbitrary attacker may exploit this vulnerability to compromise the system.

  • CVSS V3 rated as High - 6.1 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit EulerOS-SA-2021-2671 for updates and patch information

    CVEs related to QID 671026

    Software Advisories
    Advisory ID Software Component Link
    EulerOS-SA-2021-2671 EulerOS V2.0SP5 URL Logo developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-2671