twisted@18.4.0rc1 vulnerabilities
An asynchronous networking framework written in Python
-
latest version
24.10.0
-
latest non vulnerable version
-
first published
19 years ago
-
latest version published
a month ago
-
licenses detected
- [2.1.0,)
Direct Vulnerabilities
Known vulnerabilities in the twisted package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Response Smuggling. When sending multiple HTTP/1.1 requests in one TCP segment, twisted.web does not guarantee the response order. An attacker in control of an endpoint can manipulate a different user's second response to a pipelined chunked request by delaying the response to their own request. Information disclosure across sessions may also be possible for reverse proxy servers using pooled connections. How to fix HTTP Response Smuggling? Upgrade |
[16.3.0,24.7.0rc1)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when the victim is using Firefox, due to an unescaped URL in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,24.7.0rc1)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Response Smuggling. When sending multiple HTTP/1.1 requests in one TCP segment, twisted.web does not guarantee the response order. An attacker in control of an endpoint can manipulate a different user's second response to a pipelined chunked request by delaying the response to their own request. How to fix HTTP Response Smuggling? Upgrade |
[16.3.0,23.10.0rc1)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Header Injection via the How to fix HTTP Header Injection? Upgrade |
[,22.10.0rc1)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Request Smuggling due to missing checks when requests with modified headers are sent. An attacker could exploit this vulnerability by using the following request smuggling techniques:
How to fix HTTP Request Smuggling? Upgrade |
[,20.3.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Request Smuggling in the How to fix HTTP Request Smuggling? Upgrade |
[,22.4.0rc1)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to Information Exposure due to improper handling of sensitive data in How to fix Information Exposure? Upgrade |
[11.1.0,22.1.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Header Injection. How to fix HTTP Header Injection? Upgrade |
[,19.2.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Request Smuggling. When presented with two How to fix HTTP Request Smuggling? Upgrade |
[,20.3.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to HTTP Request Splitting. When presented with a How to fix HTTP Request Splitting? Upgrade |
[,20.3.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM)
via the How to fix Man-in-the-Middle (MitM)? Upgrade |
[,19.7.0)
|
Twisted is an event-based network programming and multi-protocol integration framework. Affected versions of this package are vulnerable to Improper Input Validation due to the package not validating or sanitizing URIs or HTTP methods, this allows an attacker to inject invalid characters such as CRLF. How to fix Improper Input Validation? Upgrade |
[,19.2.1)
|