HTTP Response Smuggling Affecting twisted package, versions [16.3.0,23.10.0rc1)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TWISTED-6036202
- published 26 Oct 2023
- disclosed 25 Oct 2023
- credit mukeran
Introduced: 25 Oct 2023
CVE-2023-46137 Open this link in a new tabHow to fix?
Upgrade Twisted
to version 23.10.0rc1 or higher.
Overview
Twisted is an event-based network programming and multi-protocol integration framework.
Affected versions of this package are vulnerable to HTTP Response Smuggling. When sending multiple HTTP/1.1 requests in one TCP segment, twisted.web does not guarantee the response order. An attacker in control of an endpoint can manipulate a different user's second response to a pipelined chunked request by delaying the response to their own request.
Workaround
This vulnerability can be avoided by enforcing HTTP/2, as it is only vulnerable for HTTP/1.x traffic.