First published: Wed Oct 26 2022(Updated: )
Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/twisted | <18.9.0-11ubuntu0.20.04.3 | 18.9.0-11ubuntu0.20.04.3 |
ubuntu/twisted | <22.1.0-2ubuntu2.4 | 22.1.0-2ubuntu2.4 |
ubuntu/twisted | <22.4.0-4 | 22.4.0-4 |
debian/twisted | <=18.9.0-3+deb10u1<=20.3.0-7+deb11u1 | 18.9.0-3+deb10u2 22.4.0-4 23.10.0-2 |
pip/twisted | >=0.9.4<22.10.0rc1 | 22.10.0rc1 |
Twisted Twisted | >=0.9.4<22.10.0 | |
Debian GNU/Linux | =10.0 | |
twistedmatrix Twisted | >=0.9.4<22.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-39348.
The severity of CVE-2022-39348 is medium with a CVSS score of 5.4.
Versions of Twisted from 0.9.4 to 22.10.0 and Debian Linux 10.0 are affected by CVE-2022-39348.
CVE-2022-39348 allows the host header to be rendered unescaped into the 404 response, potentially exposing HTML and script injection vulnerabilities.
To fix CVE-2022-39348, make sure to update Twisted to version 22.10.0 or later, or apply the necessary security patches provided by the vendor.