CVE-2014-9720: Tornado XSRF cookie allows side-channel attack against TLS (BREACH attack)
(updated )
Tornado before 3.2.2 sends arbitrary responses that contain a fixed CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
References
- bugzilla.novell.com/show_bug.cgi?id=930362
- bugzilla.redhat.com/show_bug.cgi?id=1222816
- github.com/advisories/GHSA-8vpw-mgpf-mpvv
- github.com/pypa/advisory-database/tree/main/vulns/tornado/PYSEC-2020-213.yaml
- github.com/tornadoweb/tornado
- github.com/tornadoweb/tornado/commit/1c36307463b1e8affae100bf9386948e6c1b2308
- nvd.nist.gov/vuln/detail/CVE-2014-9720
Detect and mitigate CVE-2014-9720 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →