Search for vulnerabilities
Vulnerability details: VCID-q9z9-b3dx-aaah
Vulnerability ID VCID-q9z9-b3dx-aaah
Aliases CVE-2024-41810
GHSA-cf56-g6w6-pqq2
PYSEC-2024-75
Summary Twisted vulnerable to HTML injection in HTTP redirect body ### Summary The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. ### Details Twisted’s `redirectTo` function generates an `HTTP 302 Redirect` response. The response contains an HTML body, built for exceptional cases where the browser doesn’t properly handle the redirect, allowing the user to click a link, navigating them to the specified destination. The function reflects the destination URL in the HTML body without any output encoding. ```python # https://github.com/twisted/twisted/blob/trunk/src/twisted/web/_template_util.py#L88 def redirectTo(URL: bytes, request: IRequest) -> bytes: # ---snip--- content = b""" <html> <head> <meta http-equiv=\"refresh\" content=\"0;URL=%(url)s\"> </head> <body bgcolor=\"#FFFFFF\" text=\"#000000\"> <a href=\"%(url)s\">click here</a> </body> </html> """ % { b"url": URL } return content ``` If an attacker has full or partial control over redirect location due to an application bug, also known as an “Open Redirect”, they may inject arbitrary HTML into the response’s body, ultimately leading to an XSS attack. It’s worth noting that the issue is known to maintainers and tracked with GitHub [Issue#9839](https://github.com/twisted/twisted/issues/9839). The issue description, however, does not make any mention of exploitability and simply states: “…Browsers don't seem to actually render that page…” ### PoC The issue can be reproduced by running the following Twisted-based HTTP server locally: ```python from twisted.web import server, resource from twisted.internet import reactor from twisted.web.util import redirectTo class Simple(resource.Resource): isLeaf = True def render_GET(self, request): url = request.args[b'url'][0] # <-- open redirect return redirectTo(url, request) site = server.Site(Simple()) reactor.listenTCP(9009, site) reactor.run() ``` Once running, navigate to the following URL: `http://127.0.0.1:9009?url=ws://example.com/"><script>alert(document.location)</script>`, and verify that the “alert” dialog was displayed. **Note**: Due to the different ways browsers validate the redirect Location header, this attack is possible only in **Firefox**. All other tested browsers will display an error message to the user and will not render the HTML body. ### Impact If successfully exploited, the issue will allow malicious JavaScript to run in the context of the victim's session. This will in turn lead to unauthorized access/modification to victim's account and information associated with it, or allow for unauthorized operations to be performed within the context of the victim's session.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 4.2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41810.json
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.00089 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.2368 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.24186 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
epss 0.3149 https://api.first.org/data/v1/epss?cve=CVE-2024-41810
cvssv3.1 6.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-cf56-g6w6-pqq2
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2024-75.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2024-75.yaml
cvssv3.1 6.1 https://github.com/twisted/twisted
generic_textual MODERATE https://github.com/twisted/twisted
cvssv3.1 6.1 https://github.com/twisted/twisted/commit/046a164f89a0f08d3239ecebd750360f8914df33
generic_textual MODERATE https://github.com/twisted/twisted/commit/046a164f89a0f08d3239ecebd750360f8914df33
cvssv3.1 6.1 https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2
generic_textual MODERATE https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2024-41810
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2024-41810
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-41810
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41810.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2024-75.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twisted/twisted
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twisted/twisted/commit/046a164f89a0f08d3239ecebd750360f8914df33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-41810
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-41810
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.36329
EPSS Score 0.00083
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-07-29T20:24:39.234774+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-cf56-g6w6-pqq2/GHSA-cf56-g6w6-pqq2.json 34.0.0rc4