<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>安全漏洞 &#8211; 李辉 / Grey Li</title>
	<atom:link href="https://greyli.com/tag/%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/feed/" rel="self" type="application/rss+xml" />
	<link>https://greyli.com</link>
	<description>一个编程和写作爱好者的在线记事本</description>
	<lastBuildDate>Thu, 06 Nov 2025 11:36:11 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.26</generator>

<image>
	<url>https://greyli.com/wp-content/uploads/2025/03/avatar-500-compressed-144x144.jpg</url>
	<title>安全漏洞 &#8211; 李辉 / Grey Li</title>
	<link>https://greyli.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Flask 0.12.2版本发现安全漏洞，请考虑升级</title>
		<link>https://greyli.com/flask-0-12-2-vulnerability/</link>
		<comments>https://greyli.com/flask-0-12-2-vulnerability/#respond</comments>
		<pubDate>Sat, 25 Aug 2018 04:05:46 +0000</pubDate>
		<dc:creator><![CDATA[李辉]]></dc:creator>
				<category><![CDATA[计算机与编程]]></category>
		<category><![CDATA[Flask]]></category>
		<category><![CDATA[安全漏洞]]></category>

		<guid isPermaLink="false">http://greyli.com/?p=1898</guid>
		<description><![CDATA[因为Flask-CKEditor的示例程序目录下包含一个旧的requirements.txt文件，其中Flas [&#8230;]]]></description>
				<content:encoded><![CDATA[<div data-contents="true">
<p data-offset-key="58f6t-0-0">因为Flask-CKEditor的示例程序目录下包含一个旧的requirements.txt文件，其中Flask版本被固定为0.12.2，推动代码到GitHub时，触发了内置的依赖安全提示，进而了解了一下这个关于Flask 0.12.2版本的漏洞。</p>
<h2 class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="58f6t-0-0"><span data-offset-key="58f6t-0-0">漏洞描述</span></h2>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="5immg-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="5immg-0-0"><span data-offset-key="5immg-0-0">这个漏洞（<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000656">CVE-2018-1000656</a>）四天前（8月20号）被发布在NVD（National Vulnerability Database，国家漏洞数据库）上，漏洞描述如下：</span></div>
</div>
<blockquote class="Editable-styled" data-block="true" data-editor="c65ub" data-offset-key="9m0r7-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="9m0r7-0-0"><span data-offset-key="9m0r7-0-0">The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3.</span></div>
</blockquote>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="1h0ki-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="1h0ki-0-0"><span data-offset-key="1h0ki-0-0">大致的翻译如下：</span></div>
</div>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="eupm0-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="eupm0-0-0"><span data-offset-key="eupm0-0-0">Pallets项目组开发的Flask 0.12.3及以下版本包含CWE-20类型的漏洞：不合适的输入验证漏洞。这个漏洞将会导致大量内存占用，可能会导致拒绝服务。攻击者可以通过提供使用了错误编码的JSON数据来进行攻击。这个漏洞已经在0.12.3版本中修复（</span><a class="Link ztext-link" href="https://github.com/pallets/flask/pull/2691" target="_blank" rel="noopener" data-offset-key="eupm0-1-0" data-editable="true"><span data-offset-key="eupm0-1-0">#2691</span></a><span data-offset-key="eupm0-2-0">）。</span></div>
</div>
<h2 class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="989vs-0-0"><span data-offset-key="989vs-0-0">应对措施</span></h2>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="3mt36-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="3mt36-0-0"><span data-offset-key="3mt36-0-0">对于这个漏洞，你可以通过升级来进行防范。如果你打算使用最新版本（</span><a class="Link ztext-link" href="http://flask.pocoo.org/docs/1.0/changelog/#version-1-0-2" target="_blank" rel="noopener" data-offset-key="3mt36-1-0" data-editable="true"><span data-offset-key="3mt36-1-0">Flask 1.0.2</span></a><span data-offset-key="3mt36-2-0">），可以使用下面的命令更新（参见</span><a class="Link ztext-link" href="https://zhuanlan.zhihu.com/p/36171280" target="_blank" rel="noopener" data-offset-key="3mt36-3-0" data-editable="true"><span data-offset-key="3mt36-3-0">这篇文章</span></a><span data-offset-key="3mt36-4-0">了解Flask 1.0版本包含哪些主要变化）：</span></div>
</div>
<pre data-offset-key="467l0-0-0" class="">$ pip install -U flask</pre>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="48fi0-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="48fi0-0-0"><span data-offset-key="48fi0-0-0">如果你使用Pipenv，则可以使用下面的命令：</span></div>
</div>
<pre data-offset-key="326a1-0-0" class="">$ pipenv update flask</pre>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="cje5r-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="cje5r-0-0"><span data-offset-key="cje5r-0-0">如果你还没有准备好使用最新版本，可以升级到</span><a class="Link ztext-link" href="http://flask.pocoo.org/docs/1.0/changelog/#version-0-12-3" target="_blank" rel="noopener" data-offset-key="cje5r-1-0" data-editable="true"><span data-offset-key="cje5r-1-0">0.12.3版本</span></a><span data-offset-key="cje5r-2-0">：</span></div>
</div>
<pre data-offset-key="fsltq-0-0" class="">$ pip install flask==0.12.3</pre>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="7dfub-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="7dfub-0-0"><span data-offset-key="7dfub-0-0">然后更新requirements.txt：</span></div>
</div>
<pre data-offset-key="391rj-0-0" class="">flask ~&gt; 0.12.3</pre>
<div class="Editable-unstyled" data-block="true" data-editor="c65ub" data-offset-key="c5ijo-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="c5ijo-0-0"><span data-offset-key="c5ijo-0-0"> 如果使用Pipenv，则使用下面的命令：</span></div>
</div>
<pre data-offset-key="67gkt-0-0" class="">$ pipenv install flask==0.12.3</pre>
<h2 class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="ajsf4-0-0"><span data-offset-key="ajsf4-0-0">附注</span></h2>
<ul class="public-DraftStyleDefault-ul" data-offset-key="bhpkm-0-0">
<li class="Editable-styled public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-reset public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="c65ub" data-offset-key="bhpkm-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="bhpkm-0-0"><span data-offset-key="bhpkm-0-0">NVD是美国政府收集网络安全漏洞的网站，类似“乌云”，详情见</span><a class="Link ztext-link" href="https://en.wikipedia.org/wiki/National_Vulnerability_Database" target="_blank" rel="noopener" data-offset-key="bhpkm-1-0" data-editable="true"><span data-offset-key="bhpkm-1-0">National Vulnerability Database</span></a><span data-offset-key="bhpkm-2-0">；</span></div>
</li>
<li class="Editable-styled public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="c65ub" data-offset-key="6ntdj-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="6ntdj-0-0"><span data-offset-key="6ntdj-0-0">CWE（Common Weakness Enumeration，常见缺陷枚举）是漏洞分类标准，由美国非营利组织MITRE维护，详情见</span><a class="Link ztext-link" href="https://cwe.mitre.org/" target="_blank" rel="noopener" data-offset-key="6ntdj-1-0" data-editable="true"><span data-offset-key="6ntdj-1-0">Common Weakness Enumeration</span></a><span data-offset-key="6ntdj-2-0">。</span></div>
</li>
<li class="Editable-styled public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="c65ub" data-offset-key="2045e-0-0">
<div class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr" data-offset-key="2045e-0-0"><span data-offset-key="2045e-0-0">CVE（</span><a class="Link ztext-link" href="https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures" target="_blank" rel="noopener" data-offset-key="2045e-1-0" data-editable="true"><span data-offset-key="2045e-1-0">The Common Vulnerabilities and Exposures</span></a><span data-offset-key="2045e-2-0">，一般漏洞及暴露）是一个漏洞数据库，由美国非营利组织MITRE维护，详情见</span><a class="Link ztext-link" href="https://cve.mitre.org/" target="_blank" rel="noopener" data-offset-key="2045e-3-0" data-editable="true"><span data-offset-key="2045e-3-0">Common Vulnerabilities and Exposures (CVE)</span></a><span data-offset-key="2045e-4-0">。</span></div>
</li>
</ul>
</div>
]]></content:encoded>
			<wfw:commentRss>https://greyli.com/flask-0-12-2-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
