-
CVSS Score
-The vulnerability stems from SharedDataMiddleware's path handling implementation. The Pallets blog post explicitly states that SharedDataMiddleware used a separate path-joining mechanism instead of the already-fixed safe_join() function. On Windows, os.path.join() resets the path when encountering a drive name (e.g., 'C:'), allowing attackers to escape the restricted directory. The fix in 0.15.5 involved switching to safe_join(), confirming the vulnerability resided in SharedDataMiddleware's path resolution logic.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| werkzeug | pip | < 0.15.5 | 0.15.5 |
A Semantic Attack on Google Gemini - Read the Latest Research