Bug 2051865 (CVE-2022-21712)

Summary: CVE-2022-21712 dev-python/twisted: secret exposure in cross-origin redirects
Product: [Other] Security Response Reporter: Vipul Nair <vinair>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amctagga, anharris, bbuckingham, bcoca, bcourt, bniver, btotty, chousekn, cmeyers, davidn, dbecker, ehelms, flucifre, gblomqui, gmeno, hvyas, jcammara, jhardy, jjoyce, jobarker, jschluet, jsherril, lhh, lmadsen, lpeer, lzap, mabashia, mbenjamin, mburns, mgarciac, mhackett, mhroncok, mhulan, mmccune, mrunge, myarboro, nmoumoul, notting, orabin, osapryki, pcreech, python-maint, python-sig, rchan, relrod, rhos-maint, rpetrell, sclewis, sdoran, slinaber, smcdonal, sostapov, tkuratom, tvignaud, V02460, vereddy, zebob.m
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: twisted 22.1 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the twisted Python library when WebClient redirects via the RedirectAgent and BrowserLikeRedirectAgent methods. This flaw allows an attacker to take advantage of these cross-origin redirects and leak the cookie and authorization headers.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-03-24 14:01:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2059507, 2060280, 2060281, 2053744, 2053745, 2053746, 2056105, 2059508, 2066919    
Bug Blocks: 2051861    

Description Vipul Nair 2022-02-08 08:45:12 UTC
twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twisted.web.RedirectAgent` and `twisted.web.BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds.

https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
https://github.com/twisted/twisted/releases/tag/twisted-22.1.0
https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx

Comment 4 Avinash Hanwate 2022-03-01 08:48:58 UTC
Created python-twisted tracking bugs for this issue:

Affects: epel-all [bug 2059507]
Affects: fedora-all [bug 2059508]

Comment 8 errata-xmlrpc 2022-03-23 22:29:21 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2

Via RHSA-2022:0992 https://access.redhat.com/errata/RHSA-2022:0992

Comment 9 errata-xmlrpc 2022-03-24 11:04:05 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.1

Via RHSA-2022:0982 https://access.redhat.com/errata/RHSA-2022:0982

Comment 10 Product Security DevOps Team 2022-03-24 14:01:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21712