Description
CVE-2022-21712 - High Severity Vulnerability
Vulnerable Library - Twisted-19.7.0-cp37-cp37m-manylinux1_x86_64.whl
An asynchronous networking framework written in Python
Library home page: https://files.pythonhosted.org/packages/84/af/d15d3686e56c704796b23b67552f3ac78b84652793091a7d7ac8bf2887d7/Twisted-19.7.0-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /scrapers/requirements.txt
Path to vulnerable library: /scrapers/requirements.txt
Dependency Hierarchy:
- Scrapy-1.8.2-py2.py3-none-any.whl (Root Library)
- ❌ Twisted-19.7.0-cp37-cp37m-manylinux1_x86_64.whl (Vulnerable Library)
Found in HEAD commit: eff3133e8c2781f4e6938917d79c535e6b345e09
Vulnerability Details
twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the twited.web.RedirectAgent
and twisted.web. BrowserLikeRedirectAgent
functions. Users are advised to upgrade. There are no known workarounds.
Publish Date: 2022-02-07
URL: CVE-2022-21712
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-92x2-jw7w-xvvx
Release Date: 2022-02-07
Fix Resolution: Twisted - 22.1.0
Step up your Open Source Security Game with WhiteSource here