oss-sec mailing list archives
CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Fri, 18 May 2012 12:40:17 +0200
Hello Kurt, Steve, vendors, Package: -------- Tornado is an open source version of the scalable, non-blocking web server and tools that power FriendFeed: URL: http://www.tornadoweb.org/ ---- Issue: ------ A possibility of header injection / response splitting flaw was found in the way web request handler of Tornado, a scalable, non-blocking web server and tools, performed sanitization of input arguments, provided to routine setting the HTTP response header name and value. If an application using the Tornado web framework accepted untrusted user input and based on that input updated the HTTP headers content (to redirect the user etc.), by providing a specially-crafted input a remote attacker could use this flaw to perform cross-site scripting attacks, cross-user defacement, web cache poisoning etc. Upstream v2.2.1 release changelog: [1] http://www.tornadoweb.org/documentation/releases/v2.2.1.html References: [2] https://bugs.gentoo.org/show_bug.cgi?id=415903 [3] https://bugzilla.redhat.com/show_bug.cgi?id=822852 Could you allocate a CVE id for this? (should be CVE-2012-* one) Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Current thread:
- CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection Jan Lieskovsky (May 18)