oss-sec mailing list archives
Re: CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection
From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 18 May 2012 11:40:56 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/18/2012 04:40 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors, Package: -------- Tornado is an open source version of the scalable, non-blocking web server and tools that power FriendFeed: URL: http://www.tornadoweb.org/ ---- Issue: ------ A possibility of header injection / response splitting flaw was found in the way web request handler of Tornado, a scalable, non-blocking web server and tools, performed sanitization of input arguments, provided to routine setting the HTTP response header name and value. If an application using the Tornado web framework accepted untrusted user input and based on that input updated the HTTP headers content (to redirect the user etc.), by providing a specially-crafted input a remote attacker could use this flaw to perform cross-site scripting attacks, cross-user defacement, web cache poisoning etc. Upstream v2.2.1 release changelog: [1] http://www.tornadoweb.org/documentation/releases/v2.2.1.html References: [2] https://bugs.gentoo.org/show_bug.cgi?id=415903 [3] https://bugzilla.redhat.com/show_bug.cgi?id=822852 Could you allocate a CVE id for this? (should be CVE-2012-* one) Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Please use CVE-2012-2374 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJPtomnAAoJEBYNRVNeJnmTt6QQAM5JUGGwQxV8LmGuKsFAUmN5 yfcDxNhY9b1a8lMFBfnNuFG9dSf+DbuAYgbe3hqPiFlj6fWMofIXcsUxPoUEuTLf 5dkdypWOqun1BRLr72vyGxvO7KPoSijAvm8K2q7N3sPhB0D1bj914xhw1XCHorj5 zJ7/6krCefJY2bCGt90zqzjN/pAVXYYoi5i0czZAaiVDjcj87udgXVgzk3MjX7zh +UFxL5tJaWE9jZsXD61JkFhq/ZvKhfSjGbj1gmcNQxf7FFWoXoKLttHrb3gXHQxX BHEnUgs2zUzrm66Z4hLvztUMw5iJWawJh5s0UtIQaWagrSUY9QeTzeiDej5ppRfC h+41F8n0R1C94e598vCoOEQUXHBDrvJBRSws/ihJyojtOMjQ839X2zKDtcdM/+Nn 9q/eL/qrGpCpPfZsKLrT/66glDcbW0ENUaB6EYvn5d3Wx38MkX+KTccqz9v9OKV5 arbFvYr+32AE7AHyxG8UKzSlN/3yz8QlO+6E3ajvAAbndlF+2LbOPtN8X2k0/pUI iPWI3yrtF84GMb9MUmfC3SEnHKZe/K3n3WPCFkyj2VpPv7IFwafCloc6ccUXRfpC MaLplHIotptFWgIYtHwqO3IqcM2Vp0XqsUv02Sfa9ghbt4rJVgEelNcXf7F5mU0W P75K9LZVPjfFbQSKMakn =7TSV -----END PGP SIGNATURE-----
Current thread:
- CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection Jan Lieskovsky (May 18)
- Re: CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection Kurt Seifried (May 18)