Bug 1223979 (CVE-2024-34069) - VUL-0: CVE-2024-34069: python-Werkzeug: remote code execution through debugger when interacting with attacker controlled domain
Summary: VUL-0: CVE-2024-34069: python-Werkzeug: remote code execution through debugge...
Status: IN_PROGRESS
Alias: CVE-2024-34069
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/404497/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-34069:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-06 16:42 UTC by SMASH SMASH
Modified: 2024-06-19 08:30 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-06 16:42:12 UTC
Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-34069
https://www.cve.org/CVERecord?id=CVE-2024-34069
https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692
https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985
Comment 4 OBSbugzilla Bot 2024-05-07 06:55:04 UTC
This is an autogenerated message for OBS integration:
This bug (1223979) was mentioned in
https://build.opensuse.org/request/show/1172322 Factory / python-Werkzeug
Comment 14 Maintenance Automation 2024-05-09 12:30:09 UTC
SUSE-SU-2024:1572-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33734](https://smelt.suse.de/incident/33734/)
Sources used:
Public Cloud Module 12 (src):
 python-Werkzeug-0.12.2-10.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2024-05-10 08:30:16 UTC
SUSE-SU-2024:1591-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33729](https://smelt.suse.de/incident/33729/)
Sources used:
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
openSUSE Leap 15.4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1, python-Werkzeug-test-2.3.6-150400.6.9.1
openSUSE Leap 15.5 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
openSUSE Leap 15.6 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
Python 3 Module 15-SP5 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 python-Werkzeug-2.3.6-150400.6.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Maintenance Automation 2024-05-10 20:30:13 UTC
SUSE-SU-2024:1608-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33733](https://smelt.suse.de/incident/33733/)
Sources used:
openSUSE Leap 15.5 (src):
 python-Werkzeug-doc-0.14.1-150100.6.9.1
openSUSE Leap 15.6 (src):
 python-Werkzeug-doc-0.14.1-150100.6.9.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 python-Werkzeug-0.14.1-150100.6.9.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 python-Werkzeug-0.14.1-150100.6.9.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 python-Werkzeug-0.14.1-150100.6.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Maintenance Automation 2024-05-13 16:30:06 UTC
SUSE-SU-2024:1624-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33728](https://smelt.suse.de/incident/33728/)
Sources used:
openSUSE Leap 15.3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
openSUSE Leap 15.5 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
Basesystem Module 15-SP5 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Package Hub 15 15-SP5 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Manager Proxy 4.3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Manager Retail Branch Server 4.3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Manager Server 4.3 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Enterprise Storage 7.1 (src):
 python-Werkzeug-1.0.1-150300.3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 21 Maintenance Automation 2024-06-18 12:30:31 UTC
SUSE-SU-2024:1591-2: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33729](https://smelt.suse.de/incident/33729/)
Sources used:
Python 3 Module 15-SP6 (src):
 python-Werkzeug-2.3.6-150400.6.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 22 Maintenance Automation 2024-06-19 08:30:37 UTC
SUSE-SU-2024:1624-2: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1223979
CVE References: CVE-2024-34069
Maintenance Incident: [SUSE:Maintenance:33728](https://smelt.suse.de/incident/33728/)
Sources used:
Basesystem Module 15-SP6 (src):
 python-Werkzeug-1.0.1-150300.3.8.1
SUSE Package Hub 15 15-SP6 (src):
 python-Werkzeug-1.0.1-150300.3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.