icon

We found results for “

CVE-2022-23607

Good to know:

icon
icon

Date: February 1, 2022

treq is an HTTP library inspired by requests but written on top of Twisted's Agents. Treq's request methods ("treq.get", "treq.post", etc.) and "treq.client.HTTPClient" constructor accept cookies as a dictionary. Such cookies are not bound to a single domain, and are therefore sent to every domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should "https://example.com"; redirect to "http://cloudstorageprovider.com"; the latter will receive the cookie "session". Treq 2021.1.0 and later bind cookies given to request methods ("treq.request", "treq.get", "HTTPClient.request", "HTTPClient.get", etc.) to the origin of the url parameter. Users are advised to upgrade. For users unable to upgrade Instead of passing a dictionary as the cookies argument, pass a "http.cookiejar.CookieJar" instance with properly domain- and scheme-scoped cookies in it.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Exposure of Sensitive Information to an Unauthorized Actor

CWE-200

URL Redirection to Untrusted Site ('Open Redirect')

CWE-601

Direct Request ('Forced Browsing')

CWE-425

Top Fix

icon

Upgrade Version

Upgrade to version treq - 22.1.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): PARTIAL
Integrity (I): NONE
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us