HTTP Request Smuggling Affecting twisted package, versions [,20.3.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-TWISTED-3040866
  • published 7 Oct 2022
  • disclosed 7 Oct 2022
  • credit Jake Miller, ZeddYu Lu

Introduced: 7 Oct 2022

CVE NOT AVAILABLE CWE-444 Open this link in a new tab

How to fix?

Upgrade Twisted to version 20.3.0 or higher.

Overview

Twisted is an event-based network programming and multi-protocol integration framework.

Affected versions of this package are vulnerable to HTTP Request Smuggling due to missing checks when requests with modified headers are sent. An attacker could exploit this vulnerability by using the following request smuggling techniques:

  1. Sending Requests with multiple Content-Length headers
  2. Sending Requests with a Content-Length header and a Transfer-Encoding header
  3. Sending Requests whose Transfer-Encoding header has a value other than chunked and identity

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None