tornado@6.3.2 vulnerabilities

Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

  • latest version

    6.5.3

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the tornado package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Excessive Iteration

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to Excessive Iteration in the _parseparam() function. An attacker can cause the server to become unresponsive and consume excessive CPU resources by sending requests with a large number of maliciously crafted parameters in the Content-Disposition header.

    How to fix Excessive Iteration?

    Upgrade tornado to version 6.5.3 or higher.

    [,6.5.3)
    • M
    HTTP Header Injection

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to HTTP Header Injection via the reason argument in HTTP status handling. An attacker can inject arbitrary HTTP headers or execute malicious scripts in the browser by supplying crafted input to the RequestHandler.set_status or tornado.web.HTTPError parameters.

    ##Workaround

    This issue can be mitigated by controlling the usage of untrusted data for the reason argument.

    How to fix HTTP Header Injection?

    Upgrade tornado to version 6.5.3 or higher.

    [,6.5.3)
    • H
    Inefficient Algorithmic Complexity

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to Inefficient Algorithmic Complexity in the HTTPHeaders.add method. An attacker can cause the server's event loop to become unresponsive for an extended period by sending a single maliciously crafted HTTP request with repeated header names, leading to excessive string concatenation and high CPU usage.

    Note:

    This is only exploitable if the max_header_size configuration has been increased from its default value.

    How to fix Inefficient Algorithmic Complexity?

    Upgrade tornado to version 6.5.3 or higher.

    [,6.5.3)
    • H
    Allocation of Resources Without Limits or Throttling

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the multipart/form-data parser. An attacker can generate an extremely high volume of logs, leading to a denial of service by sending malformed multipart form data that triggers continuous error logging.

    Note:

    This is only exploitable if the logging subsystem is synchronous.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade tornado to version 6.5 or higher.

    [,6.5)
    • M
    Regular Expression Denial of Service (ReDoS)

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to inefficient cookie parsing that results in quadratic performance. An attacker could cause tornado to consume excessive CPU resources and block the event loop through maliciously crafted cookies.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade tornado to version 6.4.2 or higher.

    [,6.4.2)
    • M
    HTTP Request Smuggling

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to HTTP Request Smuggling due to the handling of multiple Transfer-Encoding: chunked headers. An attacker can desynchronize the connection and potentially bypass ACLs or poison caches by sending crafted requests with duplicate Transfer-Encoding: chunked headers.

    How to fix HTTP Request Smuggling?

    Upgrade tornado to version 6.4.1 or higher.

    [,6.4.1)
    • M
    Improper Neutralization of CRLF Sequences ('CRLF Injection')

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') through the CurlAsyncHTTPClient headers. An attacker can manipulate HTTP headers and construct unauthorized requests by injecting CRLF sequences into header values.

    How to fix Improper Neutralization of CRLF Sequences ('CRLF Injection')?

    Upgrade tornado to version 6.4.1 or higher.

    [,6.4.1)
    • M
    HTTP Request Smuggling

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to HTTP Request Smuggling via the parse and validate strings capabilities in the int constructor.

    Notes:

    1. This is possible when Tornado is deployed behind certain proxies that interpret those non-standard characters differently.
    2. This is known to apply to older versions of haproxy, although the current release is not affected.

    How to fix HTTP Request Smuggling?

    Upgrade tornado to version 6.3.3 or higher.

    [,6.3.3)
    • M
    HTTP Request Smuggling

    tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed.

    Affected versions of this package are vulnerable to HTTP Request Smuggling due to improper parsing of the -, +, and _ characters in chunk length and Content-Length fields through the int constructor.

    Note: Exploiting this vulnerability is possible if Tornado is deployed behind certain proxies that interpret non-standard characters differently, such as older versions of haproxy.

    How to fix HTTP Request Smuggling?

    Upgrade tornado to version 6.3.3 or higher.

    [,6.3.3)