{"id":"CVE-2024-1681","details":"corydolphin/flask-cors is vulnerable to log injection when the log level is set to debug. An attacker can inject fake log entries into the log file by sending a specially crafted GET request containing a CRLF sequence in the request path. This vulnerability allows attackers to corrupt log files, potentially covering tracks of other attacks, confusing log post-processing tools, and forging log entries. The issue is due to improper output neutralization for logs.","aliases":["GHSA-84pr-m4jr-85g5","PYSEC-2024-271"],"modified":"2026-05-20T18:26:20.327517793Z","published":"2024-04-19T20:15:09.273Z","related":["CGA-jr52-5m9j-gvww","openSUSE-SU-2024:14293-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00049.html"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/25a7a0ba-9fa2-4777-acb6-03e5539bb644"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1681.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.0.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}