{"id":"PYSEC-2017-43","details":"Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.","aliases":["CVE-2016-10516","GHSA-h2fp-xgx6-xh6f"],"modified":"2023-11-08T03:58:10.053222Z","published":"2017-10-23T16:29:00Z","references":[{"type":"WEB","url":"https://github.com/pallets/werkzeug/pull/1001"},{"type":"ARTICLE","url":"http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-h2fp-xgx6-xh6f"}],"affected":[{"package":{"name":"werkzeug","ecosystem":"PyPI","purl":"pkg:pypi/werkzeug"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.11.11"}]}],"versions":["0.1","0.10","0.10.1","0.10.2","0.10.3","0.10.4","0.11","0.11.1","0.11.10","0.11.2","0.11.3","0.11.4","0.11.5","0.11.6","0.11.7","0.11.8","0.11.9","0.2","0.3","0.3.1","0.4","0.4.1","0.5","0.5.1","0.6","0.6.1","0.6.2","0.7","0.7.1","0.7.2","0.8","0.8.1","0.8.2","0.8.3","0.9","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","0.9.6"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/werkzeug/PYSEC-2017-43.yaml"}}],"schema_version":"1.7.3"}