Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2022-24801 CVE-2022-39348 |
CWE-ID | CWE-444 CWE-79 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Amazon Linux AMI Operating systems & Components / Operating system python-twisted-web Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU62077
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-24801
CWE-ID:
CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to preform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP requests within the twisted.web.http module. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
python26-twisted-web-8.2.0-6.8.amzn1.i686
python27-twisted-web-8.2.0-6.8.amzn1.i686
src:
python-twisted-web-8.2.0-6.8.amzn1.src
x86_64:
python26-twisted-web-8.2.0-6.8.amzn1.x86_64
python27-twisted-web-8.2.0-6.8.amzn1.x86_64
Amazon Linux AMI: All versions
python-twisted-web: before 8.2.0-6.8
External linkshttp://alas.aws.amazon.com/ALAS-2023-1717.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68855
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-39348
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied datawithin "NameVirtualHost". A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationUpdate the affected packages:
i686:Vulnerable software versions
python26-twisted-web-8.2.0-6.8.amzn1.i686
python27-twisted-web-8.2.0-6.8.amzn1.i686
src:
python-twisted-web-8.2.0-6.8.amzn1.src
x86_64:
python26-twisted-web-8.2.0-6.8.amzn1.x86_64
python27-twisted-web-8.2.0-6.8.amzn1.x86_64
Amazon Linux AMI: All versions
python-twisted-web: before 8.2.0-6.8
External linkshttp://alas.aws.amazon.com/ALAS-2023-1717.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.