CVE-2023-46137 (Medium) detected in Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl
mend-bolt-for-github opened this issue · 0 comments
CVE-2023-46137 - Medium Severity Vulnerability
Vulnerable Library - Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl
An asynchronous networking framework written in Python
Library home page: https://files.pythonhosted.org/packages/4d/15/890ba1d83dc29ad71427ce5174d5963b84a25c8cf1973815107709fbb520/Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl
Path to dependency file: /tmp/ws-scm/scrapy-cookies
Path to vulnerable library: /tmp/ws-scm/scrapy-cookies
Dependency Hierarchy:
- Scrapy-1.8.0-py2.py3-none-any.whl (Root Library)
- ❌ Twisted-20.3.0-cp27-cp27mu-manylinux1_x86_64.whl (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.
Publish Date: 2023-10-25
URL: CVE-2023-46137
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-xc8x-vp79-p3wm
Release Date: 2023-10-25
Fix Resolution: twisted - 23.10.0
Step up your Open Source Security Game with Mend here