Vulnerability identifier: #VU33150
Vulnerability risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-295
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Twisted Web
Server applications /
Web servers
Vendor: Twisted Matrix Labs
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Twisted Web: 19.2.0 - 19.2.1
External links
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00028.html
http://github.com/twisted/twisted/pull/1147
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLTZDMFBNFSJMBXYJNGJHENJA4H2TSMZ/
http://twistedmatrix.com/trac/ticket/9561
http://usn.ubuntu.com/4308-1/
http://usn.ubuntu.com/4308-2/
http://www.oracle.com/security-alerts/cpuapr2020.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.