CVE编号
CVE-2022-23607利用情况
暂无补丁情况
N/A披露时间
2022-02-01漏洞描述
treq is an HTTP library inspired by requests but written on top of Twisted's Agents. Treq's request methods (`treq.get`, `treq.post`, etc.) and `treq.client.HTTPClient` constructor accept cookies as a dictionary. Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should `https://example.com` redirect to `http://cloudstorageprovider.com` the latter will receive the cookie `session`. Treq 2021.1.0 and later bind cookies given to request methods (`treq.request`, `treq.get`, `HTTPClient.request`, `HTTPClient.get`, etc.) to the origin of the *url* parameter. Users are advised to upgrade. For users unable to upgrade Instead of passing a dictionary as the *cookies* argument, pass a `http.cookiejar.CookieJar` instance with properly domain- and scheme-scoped cookies in it.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00025.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | twistedmatrix | treq | * |
From (including) 21.1.0 |
Up to (excluding) 22.1.0 |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | python-treq | * |
Up to (excluding) 18.6.0-0.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | python-treq | * |
Up to (excluding) 18.6.0-0.2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_12 | python-treq | * |
Up to (excluding) 22.2.0-0.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | python-treq | * |
Up to (excluding) 15.1.0-1+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | python-treq | * |
Up to (excluding) 22.2.0-0.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...