In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html | vendor advisory release notes exploit |
https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2 | third party advisory patch |
https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html | vendor advisory release notes exploit |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html | vendor advisory broken link |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html | vendor advisory broken link |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/ | vendor advisory |
https://usn.ubuntu.com/4308-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4308-1/ | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2020.html | third party advisory patch |