CVE-2023-52289: Path traversal in flaskcode
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6277%
CWE
Published
1/13/2024
Updated
1/24/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flaskcode | pip | <= 0.0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions exploitation via POST requests to /update-resource-data/<file_path> from views.py. In Flask applications, route handlers are implemented as view functions. The path traversal occurs because the file_path parameter is: 1) Taken directly from URL path parameter 2) Used to construct filesystem paths 3) Lacks proper validation/sanitization to prevent directory traversal 4) Combined with write operations. This matches the CWE-22 pattern of improper path limitation. The confidence is high as the advisory specifically identifies both the vulnerable endpoint location (views.py) and attack pattern.