Python/Twisted/19.10.0rc1
An asynchronous networking framework written in Python
https://pypi.org/project/Twisted
MIT
3 Security Vulnerabilities
Cookie and header exposure in twisted
- https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx
- https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
- https://github.com/twisted/twisted/releases/tag/twisted-22.1.0
- https://nvd.nist.gov/vuln/detail/CVE-2022-21712
- https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html
- https://security.gentoo.org/glsa/202301-02
- https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-27.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
- https://pypi.org/project/Twisted
- https://github.com/advisories/GHSA-92x2-jw7w-xvvx
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
Impact
Cookie and Authorization headers are leaked when following cross-origin redirects in twited.web.client.RedirectAgent and twisted.web.client.BrowserLikeRedirectAgent.
Improper Input Validation in Twisted
- https://nvd.nist.gov/vuln/detail/CVE-2020-10108
- https://github.com/advisories/GHSA-h96w-mmrf-2h6v
- https://github.com/twisted/twisted
- https://know.bishopfox.com/advisories
- https://know.bishopfox.com/advisories/twisted-version-19.10.0
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/
- https://usn.ubuntu.com/4308-1/
- https://security.gentoo.org/glsa/202007-24
- https://usn.ubuntu.com/4308-2/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html
- https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13
- https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281
- https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-259.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D
- https://usn.ubuntu.com/4308-1
- https://usn.ubuntu.com/4308-2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D
In Twisted Web before 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.
HTTP Request Smuggling in Twisted
- https://nvd.nist.gov/vuln/detail/CVE-2020-10109
- https://github.com/advisories/GHSA-p5xh-vx83-mxcj
- https://github.com/twisted/twisted
- https://know.bishopfox.com/advisories
- https://know.bishopfox.com/advisories/twisted-version-19.10.0
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/
- https://usn.ubuntu.com/4308-1/
- https://security.gentoo.org/glsa/202007-24
- https://usn.ubuntu.com/4308-2/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html
- https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281
- https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13
- https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-260.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D
- https://usn.ubuntu.com/4308-1
- https://usn.ubuntu.com/4308-2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
109 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 1.2.0 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.1.1 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.1.0 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.7 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.6 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.5 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.4 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.3 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
| 1.0.1 | LGPL-3.0-or-later | 2 | 1970-01-01 - 00:00 | over 56 years |
