Bug 2300497 (CVE-2024-41810) - CVE-2024-41810 python-twisted: Reflected XSS via HTML Injection in Redirect Response
Summary: CVE-2024-41810 python-twisted: Reflected XSS via HTML Injection in Redirect R...
Keywords:
Status: NEW
Alias: CVE-2024-41810
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2301619 2301621 2301625 2301617 2301618 2301620 2301622 2301623 2301624 2301626
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-29 16:24 UTC by OSIDB Bzimport
Modified: 2024-09-27 04:31 UTC (History)
26 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:7312 0 None None None 2024-09-27 04:31:17 UTC

Description OSIDB Bzimport 2024-07-29 16:24:21 UTC
Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1.

Comment 2 Lumír Balhar 2024-07-31 07:58:58 UTC
Important info from https://github.com/twisted/twisted/security/advisories/GHSA-cf56-g6w6-pqq2:

Note: Due to the different ways browsers validate the redirect Location header, this attack is possible only in Firefox. All other tested browsers will display an error message to the user and will not render the HTML body.

Comment 3 errata-xmlrpc 2024-09-27 04:31:15 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:7312 https://access.redhat.com/errata/RHSA-2024:7312


Note You need to log in before you can comment on or make changes to this bug.