QID 354859

Date Published: 2023-04-06

QID 354859: Amazon Linux Security Advisory for python-twisted-web : ALAS-2023-1717

A flaw was found in python-twisted.
This vulnerability occurs due to the parsing of illegal constructs in the twisted.web.http module.
The illegal constructs include '+/-' in the content-length header, '\n and \t' etc.
Non-conformant parsing leads to a desync if requests pass through multiple http parsers.
This flaw allows a remote attacker to perform an http request smuggling attack. (
( CVE-2022-24801) twisted is an event-based framework for internet applications.
Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.
Namevirtualhost` will return a `noresource` resource which renders the host header unescaped into the 404 response allowing html and script injection.
In practice this should be very difficult to exploit as being able to modify the host header of a normal http request implies that one is already in a privileged position.
This issue was fixed in version 22.10.0rc1.
There are no known workarounds. (
( CVE-2022-39348)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2023-1717 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354859

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2023-1717 amazon linux URL Logo alas.aws.amazon.com/ALAS-2023-1717.html