Home page logo
/

oss-sec logo oss-sec mailing list archives

CVE Request -- Tornado (python-tornado): Tornado v2.2.1 tornado.web.RequestHandler.set_header() fix to prevent header injection
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Fri, 18 May 2012 12:40:17 +0200

Hello Kurt, Steve, vendors,

Package:
--------
Tornado is an open source version of the scalable, non-blocking web server
and tools that power FriendFeed:

URL: http://www.tornadoweb.org/
----

Issue:
------
A possibility of header injection / response splitting flaw was found in the
way web request handler of Tornado, a scalable, non-blocking web server and
tools, performed sanitization of input arguments, provided to routine setting
the HTTP response header name and value. If an application using the Tornado
web framework accepted untrusted user input and based on that input updated the
HTTP headers content (to redirect the user etc.), by providing a
specially-crafted input a remote attacker could use this flaw to perform
cross-site scripting attacks, cross-user defacement, web cache poisoning etc.

Upstream v2.2.1 release changelog:
[1] http://www.tornadoweb.org/documentation/releases/v2.2.1.html

References:
[2] https://bugs.gentoo.org/show_bug.cgi?id=415903
[3] https://bugzilla.redhat.com/show_bug.cgi?id=822852

Could you allocate a CVE id for this? (should be CVE-2012-* one)

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]