CVE-2020-10108: Improper Input Validation in Twisted
(updated )
In Twisted Web before 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.
References
- github.com/advisories/GHSA-h96w-mmrf-2h6v
- github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2020-259.yaml
- github.com/twisted/twisted
- github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst
- github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281
- know.bishopfox.com/advisories
- know.bishopfox.com/advisories/twisted-version-19.10.0
- lists.debian.org/debian-lts-announce/2022/02/msg00021.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D
- nvd.nist.gov/vuln/detail/CVE-2020-10108
- security.gentoo.org/glsa/202007-24
- usn.ubuntu.com/4308-1
- usn.ubuntu.com/4308-2
- www.oracle.com/security-alerts/cpuoct2020.html
Detect and mitigate CVE-2020-10108 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →