First published: Wed Oct 25 2023(Updated: )
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Twistedmatrix Twisted | <=22.8.0 | |
pip/twisted | <23.10.0rc1 | 23.10.0rc1 |
debian/twisted | <=18.9.0-3+deb10u1<=18.9.0-3+deb10u2<=20.3.0-7+deb11u1<=22.4.0-4 | 23.10.0-2 |
ubuntu/twisted | <18.9.0-11ubuntu0.20.04.3 | 18.9.0-11ubuntu0.20.04.3 |
ubuntu/twisted | <22.1.0-2ubuntu2.4 | 22.1.0-2ubuntu2.4 |
ubuntu/twisted | <22.4.0-4ubuntu0.23.04.1 | 22.4.0-4ubuntu0.23.04.1 |
ubuntu/twisted | <22.4.0-4ubuntu0.23.10.1 | 22.4.0-4ubuntu0.23.10.1 |
redhat/twisted | <23.10.0 | 23.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-46137.
The severity of CVE-2023-46137 is medium with a CVSS score of 5.3.
The affected software is the twisted package with version up to and excluding 23.10.0rc1.
CVE-2023-46137 manifests when multiple HTTP requests are sent in one TCP packet, causing twisted.web to process the requests asynchronously without guaranteeing the response order.
Yes, you can find more information about CVE-2023-46137 in the following references: [GitHub Advisory](https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm), [GitHub Advisories](https://github.com/advisories/GHSA-xc8x-vp79-p3wm).