Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/ | issue tracking |
https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html | mailing list |
https://github.com/pallets/werkzeug/pull/1001 | third party advisory |