Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/twisted/twisted/security/advisories/GHSA-vg46-2rrj-3647 | exploit third party advisory patch |
https://github.com/twisted/twisted/commit/f2f5e81c03f14e253e85fe457e646130780db40b | patch |
https://github.com/twisted/twisted/commit/f49041bb67792506d85aeda9cf6157e92f8048f4 | patch |
https://lists.debian.org/debian-lts-announce/2022/11/msg00038.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202301-02 | third party advisory vendor advisory |