#VU33150 Improper Certificate Validation in Twisted Web


Published: 2019-06-16 | Updated: 2020-08-03

Vulnerability identifier: #VU33150

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-12855

CWE-ID: CWE-295

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Twisted Web
Server applications / Web servers

Vendor: Twisted Matrix Labs

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Twisted Web: 19.2.0 - 19.2.1


External links
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00028.html
http://github.com/twisted/twisted/pull/1147
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLTZDMFBNFSJMBXYJNGJHENJA4H2TSMZ/
http://twistedmatrix.com/trac/ticket/9561
http://usn.ubuntu.com/4308-1/
http://usn.ubuntu.com/4308-2/
http://www.oracle.com/security-alerts/cpuapr2020.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability