Headline
GHSA-32ff-4g79-vgfc: Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings
Impact
An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users.
Only when using AUTH_DB
database authentication option.
Patches
Fixed on 4.1.3
For more information
If you have any questions or comments about this advisory:
- Open an issue in example link to repo
- Email us at example email address
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2022-31177
Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings
Moderate severity GitHub Reviewed Published Jul 29, 2022 in dpgaspar/Flask-AppBuilder • Updated Jul 29, 2022
Package
pip Flask-AppBuilder (pip)
Affected versions
< 4.1.3
Description
Impact
An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users.
Only when using AUTH_DB database authentication option.
Patches
Fixed on 4.1.3
For more information
If you have any questions or comments about this advisory:
- Open an issue in example link to repo
- Email us at example email address
References
- GHSA-32ff-4g79-vgfc
- https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v4.1.3
Weaknesses
GHSA ID
GHSA-32ff-4g79-vgfc
Source code
Related news
Flask-AppBuilder is an application development framework built on top of Flask python framework. In versions prior to 4.1.3 an authenticated Admin user could query other users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respective users. This issue has been fixed in version 4.1.3. Users are advised to upgrade. There are no known workarounds for this issue.