{"id":"MGASA-2024-0234","summary":"Updated python-werkzeug packages fix security vulnerability","details":"Werkzeug is a comprehensive WSGI web application library. The debugger\nin affected versions of Werkzeug can allow an attacker to execute code\non a developer's machine under some circumstances. This requires the\nattacker to get the developer to interact with a domain and subdomain\nthey control, and enter the debugger PIN, but if they are successful it\nallows access to the debugger even if it is only running on localhost.\nThis also requires the attacker to guess a URL in the developer's\napplication that will trigger the debugger. This vulnerability is fixed\nin 3.0.3.\n","modified":"2026-04-16T00:11:49.332448861Z","published":"2024-06-24T19:04:12Z","upstream":["CVE-2024-34069"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0234.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=33201"},{"type":"WEB","url":"https://lwn.net/Articles/973069/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6799-1"}],"affected":[{"package":{"name":"python-werkzeug","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/python-werkzeug?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.3-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0234.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}