Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/twisted@22.4.0-4%2Bdeb12u1
purl pkg:deb/debian/twisted@22.4.0-4%2Bdeb12u1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-562c-1hjs-hqau Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1. CVE-2024-41810
GHSA-cf56-g6w6-pqq2
PYSEC-2024-75
VCID-tec3-uqmg-tueq Multiple vulnerabilities have been discovered in Twisted, the worst of which could result in denial of service. CVE-2022-39348
GHSA-vg46-2rrj-3647
VCID-vz8r-fhqf-zudf twisted.web has disordered HTTP pipeline response ### Summary The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP requests out-of-order, possibly resulting in information disclosure. ### PoC 0. Start a fresh Debian container: ```sh docker run --workdir /repro --rm -it debian:bookworm-slim ``` 1. Install twisted and its dependencies: ```sh apt -y update && apt -y install ncat git python3 python3-pip \ && git clone --recurse-submodules https://github.com/twisted/twisted \ && cd twisted \ && pip3 install --break-system-packages . ``` 2. Run a twisted.web HTTP server that echos received requests' methods. e.g., the following: ```python from twisted.web import server, resource from twisted.internet import reactor class TheResource(resource.Resource): isLeaf = True def render_GET(self, request) -> bytes: return b"GET" def render_POST(self, request) -> bytes: return b"POST" site = server.Site(TheResource()) reactor.listenTCP(80, site) reactor.run() ``` 3. Send it a POST request with a chunked message body, pipelined with another POST request, wait a second, then send a GET request on the same connection: ```sh (printf 'POST / HTTP/1.1\r\nTransfer-Encoding: chunked\r\n\r\n0\r\n\r\nPOST / HTTP/1.1\r\nContent-Length: 0\r\n\r\n'; sleep 1; printf 'GET / HTTP/1.1\r\n\r\n'; sleep 1) | nc localhost 80 ``` 4. Observe that the responses arrive out of order: ``` HTTP/1.1 200 OK Server: TwistedWeb/24.3.0.post0 Date: Tue, 09 Jul 2024 06:19:41 GMT Content-Length: 5 Content-Type: text/html POST HTTP/1.1 200 OK Server: TwistedWeb/24.3.0.post0 Date: Tue, 09 Jul 2024 06:19:42 GMT Content-Length: 4 Content-Type: text/html GET HTTP/1.1 200 OK Server: TwistedWeb/24.3.0.post0 Date: Tue, 09 Jul 2024 06:19:42 GMT Content-Length: 5 Content-Type: text/html POST ``` ### Impact See [GHSA-xc8x-vp79-p3wm](https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm). Further, for instances of twisted.web HTTP servers deployed behind reverse proxies that implement connection pooling, it may be possible for remote attackers to receive responses intended for other clients of the twisted.web server. CVE-2024-41671
GHSA-c8m8-j448-xjx7
VCID-y7f5-9nmg-w7b3 Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue. CVE-2023-46137
GHSA-xc8x-vp79-p3wm
PYSEC-2023-224

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T00:13:37.061063+00:00 Debian Oval Importer Fixing VCID-562c-1hjs-hqau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:08:11.072636+00:00 Debian Oval Importer Fixing VCID-vz8r-fhqf-zudf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:01:29.444977+00:00 Debian Oval Importer Fixing VCID-y7f5-9nmg-w7b3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:09:58.082241+00:00 Debian Oval Importer Fixing VCID-tec3-uqmg-tueq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T23:47:22.823367+00:00 Debian Oval Importer Fixing VCID-562c-1hjs-hqau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:51:58.347087+00:00 Debian Oval Importer Fixing VCID-vz8r-fhqf-zudf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:48:04.315039+00:00 Debian Oval Importer Fixing VCID-y7f5-9nmg-w7b3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:57:26.903727+00:00 Debian Oval Importer Fixing VCID-tec3-uqmg-tueq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:19:36.250572+00:00 Debian Oval Importer Fixing VCID-562c-1hjs-hqau https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:36:45.973771+00:00 Debian Oval Importer Fixing VCID-vz8r-fhqf-zudf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:38:18.248221+00:00 Debian Oval Importer Fixing VCID-y7f5-9nmg-w7b3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:50:35.570340+00:00 Debian Oval Importer Fixing VCID-tec3-uqmg-tueq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0