Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10108

Опубликовано: 11 мар. 2020
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.

A flaw was found in python-twisted-web, where it does not correctly process HTTP requests, accepting requests with more than one Content-Length header. When the requests sent from and to the python-twisted-web are processed by another component that correctly processes HTTP requests, for example, a proxy, back-end, or web application firewall, a remote attacker can use this flaw to perform an HTTP request smuggling attack. This flaw impacts the system differently based on the type of application and the infrastructure.

Отчет

OpenShift Container Platform 4.3 and later includes python-twisted as a dependency of python-prometheus_client in Ironic container images, however the affected code is not used. Red Hat OpenStack Platform packages the flawed code, however python-twisted's web.HTTP functionality is not used in the RHOSP environment. For this reason, the RHOSP impact has been lowered to moderate and no update will be provided at this time for the RHOSP python-twisted package. Red Hat Satellite uses affected versions of python-twisted and python-twisted-web modules in Pulp, however, it is not vulnerable since http modal of web implementation is not expose in product. Red Hat Satellite may update python-twisted and python-twisted-web in future. This issue affects the version of python-twisted(embedded in calamari-server) shipped with Red Hat Ceph Storage 2. However, calamari is no longer supported, hence the embedded python-twisted package will not be fixed.

Меры по смягчению последствий

When python-twisted-web is used as the back-end of your infrastructure, you can partially mitigate the problem by ensuring that each request on the front-end component (e.g. proxy) is sent over a separate network connection to the python-twisted-web server. This will prevent interference between different users, but it will not prevent all possible attacks that can be performed, which would vary based on the infrastructure and application in use.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2calamari-serverWill not fix
Red Hat OpenShift Container Platform 4python-twistedWill not fix
Red Hat OpenStack Platform 10 (Newton)python-twistedWill not fix
Red Hat OpenStack Platform 13 (Queens)python-twistedWill not fix
Red Hat OpenStack Platform 16 (Train)python-twistedWill not fix
Red Hat Satellite 6python-twistedWill not fix
Red Hat Satellite 6python-twisted-webWill not fix
Red Hat Enterprise Linux 6python-twisted-webFixedRHSA-2020:196229.04.2020
Red Hat Enterprise Linux 7python-twisted-webFixedRHSA-2020:156123.04.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1813439python-twisted: HTTP request smuggling when presented with two Content-Length headers

EPSS

Процентиль: 89%
0.0495
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.

CVSS3: 9.8
nvd
больше 5 лет назад

In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.

CVSS3: 9.8
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 9.8
debian
больше 5 лет назад

In Twisted Web through 19.10.0, there was an HTTP request splitting vu ...

CVSS3: 9.8
github
около 5 лет назад

Improper Input Validation in Twisted

EPSS

Процентиль: 89%
0.0495
Низкий

7.3 High

CVSS3