Skip to content

H3-2023-0002

Flask Authentication Bypass Misconfiguration

Category SECURITY_MISCONFIGURATION
Base Score 7.3

Description

A Flask-based web application was found to be using a weak or default Flask SECRET_KEY value. Flask is a web framework for building web applications in Python, and the SECRET_KEY value is used for signing session cookies. This misconfiguration allows the application's SECRET_KEY to be easily guessed or brute-forced. An attacker can exploit this misconfiguration by using tools to guess the SECRET_KEY and forge session cookies, which lets them impersonate legitimate users.

Impact

By exploiting this misconfiguration, it may be possible for an attacker to gain unauthorized access to the application and perform actions as if they were a legitimate user, potentially accessing sensitive data or performing administrative tasks.

References