CVE-2024-41671

8.3 HIGH

📋 TL;DR

This vulnerability in Twisted's HTTP server allows pipelined HTTP requests to be processed out-of-order, potentially exposing sensitive information from one user's request to another user. It affects all systems running vulnerable versions of Twisted that expose HTTP services. The risk is highest for internet-facing applications handling user data.

💻 Affected Systems

Products:
  • Twisted
Versions: All versions before 24.7.0rc1
Operating Systems: All operating systems running Python
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects twisted.web HTTP 1.0/1.1 server when pipelined requests are enabled (default). HTTPS services are also vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive user data (authentication tokens, personal information, session data) from one user's HTTP request could be disclosed to another user through response mixing.

🟠

Likely Case

Information leakage between concurrent users, potentially exposing session identifiers, form data, or API responses to unintended recipients.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF filtering, and request isolation are implemented, though risk remains until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending pipelined HTTP requests and may require specific timing conditions. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.7.0rc1 and later

Vendor Advisory: https://github.com/twisted/twisted/security/advisories/GHSA-c8m8-j448-xjx7

Restart Required: Yes

Instructions:

1. Upgrade Twisted to version 24.7.0rc1 or later using pip: 'pip install --upgrade twisted>=24.7.0rc1' 2. Restart all services using Twisted web components.

🔧 Temporary Workarounds

Disable HTTP Pipelining

all

Configure clients to not use HTTP pipelining, though this only protects from client-side exploitation, not server-side vulnerability.

Use HTTP/2 or HTTP/3

all

Switch to HTTP/2 or HTTP/3 protocols which handle multiplexing differently and are not affected by this specific pipelining issue.

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) to detect and block abnormal pipelined request patterns
  • Isolate vulnerable services behind reverse proxies that can sanitize or reorder requests

🔍 How to Verify

Check if Vulnerable:

Check Twisted version: 'python -c "import twisted; print(twisted.__version__)"' - if version is below 24.7.0rc1, system is vulnerable.

Check Version:

python -c "import twisted; print(twisted.__version__)"

Verify Fix Applied:

After upgrade, verify version is 24.7.0rc1 or higher using same command and test with pipelined HTTP requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of HTTP pipelined requests
  • Multiple requests from same source with overlapping timing
  • Unexpected response data in logs

Network Indicators:

  • HTTP traffic with pipelined requests (multiple requests sent before responses received)
  • Abnormal request/response timing patterns

SIEM Query:

source="web_server" AND (http.pipelined=true OR http.requests.count>1) | stats count by src_ip, dest_ip

🔗 References

📤 Share & Export