Information disclosure in Twisted Web



Published: 2022-03-24
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-21712
CWE-ID CWE-346
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Twisted Web
Server applications / Web servers

Vendor Twisted Matrix Labs

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Origin validation error

EUVDB-ID: #VU61611

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-21712

CWE-ID: CWE-346 - Origin Validation Error

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to origin validation error in the "twited.web.RedirectAgent" and "twisted.web.BrowserLikeRedirectAgent" functions. A remote attacker attacker can trick the victim to click on a specially crafted link and obtain cookies and authorization headers.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Twisted Web: 11.1.0 - 21.7.0

External links

http://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
http://github.com/twisted/twisted/releases/tag/twisted-22.1.0
http://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###