twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twisted.web.RedirectAgent` and `twisted.web.BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds. https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2 https://github.com/twisted/twisted/releases/tag/twisted-22.1.0 https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx
Created python-twisted tracking bugs for this issue: Affects: epel-all [bug 2059507] Affects: fedora-all [bug 2059508]
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.2 Via RHSA-2022:0992 https://access.redhat.com/errata/RHSA-2022:0992
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2022:0982 https://access.redhat.com/errata/RHSA-2022:0982
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-21712