You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host twisted.web.vhost.NameVirtualHost will return a NoResource resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.
CVE-2022-39348 - Medium Severity Vulnerability
An asynchronous networking framework written in Python
Library home page: https://files.pythonhosted.org/packages/4d/15/890ba1d83dc29ad71427ce5174d5963b84a25c8cf1973815107709fbb520/Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl
Path to dependency file: /tmp/ws-scm/scrapy-pipelines
Path to vulnerable library: /tmp/ws-scm/scrapy-pipelines,/docs/requirements.txt,/requirements.txt
Dependency Hierarchy:
Found in base branch: master
Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host
twisted.web.vhost.NameVirtualHost
will return aNoResource
resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.Publish Date: 2022-10-26
URL: CVE-2022-39348
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-39348
Release Date: 2022-10-26
Fix Resolution: twisted - 19.2.1,18.4.0;Twisted - 22.10.0rc1
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: