khiemfle / http2-serverpush-multiplexing

Conducting an experiment about HTTP/2 Server Push and Multiplexing features using Python Quart, Wireshark and Chrome
0 stars 0 forks source link

CVE-2022-39348 (Medium) detected in Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl #8

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2022-39348 - Medium Severity Vulnerability

Vulnerable Library - Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl

An asynchronous networking framework written in Python

Library home page: https://files.pythonhosted.org/packages/4d/15/890ba1d83dc29ad71427ce5174d5963b84a25c8cf1973815107709fbb520/Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl

Path to dependency file: /server/requirements.txt

Path to vulnerable library: /server/requirements.txt

Dependency Hierarchy: - :x: **Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)

Found in HEAD commit: 5c0abe480ebb00702555318009558dfdba519388

Found in base branch: master

Vulnerability Details

Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.

Publish Date: 2022-10-26

URL: CVE-2022-39348

CVSS 3 Score Details (5.4)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-39348

Release Date: 2022-10-26

Fix Resolution: 23.8.0


Step up your Open Source Security Game with Mend here