Severity
6.5MEDIUMNVD
GHSA7.5OSV7.5
EPSS
0.2%
top 54.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 1

Description

treq is an HTTP library inspired by requests but written on top of Twisted's Agents. Treq's request methods (`treq.get`, `treq.post`, etc.) and `treq.client.HTTPClient` constructor accept cookies as a dictionary. Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supercookies"). This can potentially cause sensitive information to leak upon an HTTP redirect to a different domain., e.g. should `https://example.com` redirect to `http://cloudstorageprovider.com

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5twisted/treq< 22.1.0
PyPItwisted/treq< 22.1.0
NVDtwistedmatrix/treq21.1.022.1.0
debiandebian/python-treq< python-treq 22.2.0-0.1 (bookworm)

Also affects: Debian Linux 9.0

🔴Vulnerability Details

3
OSV
Unsafe handling of user-specified cookies in treq2022-02-01
GHSA
Unsafe handling of user-specified cookies in treq2022-02-01
OSV
CVE-2022-23607: treq is an HTTP library inspired by requests but written on top of Twisted's Agents2022-02-01

📋Vendor Advisories

1
Debian
CVE-2022-23607: python-treq - treq is an HTTP library inspired by requests but written on top of Twisted's Age...2022

📐Framework References

2
CWE
Direct Request ('Forced Browsing')
CWE
Improper Access Control