{"schema_version":"1.7.2","id":"OESA-2024-2052","modified":"2024-08-23T11:08:57Z","published":"2024-08-23T11:08:57Z","upstream":["CVE-2024-41671","CVE-2024-41810"],"summary":"python-twisted security update","details":"Twisted is an event-based framework for internet applications, supporting Python 2.7 and Python 3.5+. It includes modules for many different purposes, including the following:\r\n\r\nSecurity Fix(es):\r\n\r\nTwisted is an event-based framework for internet applications, supporting Python 3.6+. The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP requests out-of-order, possibly resulting in information disclosure. This vulnerability is fixed in 24.7.0rc1.(CVE-2024-41671)\r\n\r\nTwisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1.(CVE-2024-41810)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-twisted","purl":"pkg:rpm/openEuler/python-twisted\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.4.0-4.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["python3-twisted-22.4.0-4.oe2203sp4.aarch64.rpm"],"noarch":["python-twisted-help-22.4.0-4.oe2203sp4.noarch.rpm"],"src":["python-twisted-22.4.0-4.oe2203sp4.src.rpm"],"x86_64":["python3-twisted-22.4.0-4.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2052"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41671"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-41810"}],"database_specific":{"severity":"High"}}