{"id":"CVE-2023-52289","details":"An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/\u003cfile_path\u003e URI (from views.py), allows attackers to write to arbitrary files.","aliases":["GHSA-v3rg-qm46-xrg9"],"modified":"2026-03-14T12:16:47.564637Z","published":"2024-01-13T04:15:08.240Z","references":[{"type":"ADVISORY","url":"https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sujeetkv/flaskcode","events":[{"introduced":"0"},{"last_affected":"fe8a7b955771ee3afbfcc14d06934b842dc39c02"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.0.8"}]}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52289.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}