Vigil@nce - Python Twisted: information disclosure via URI CRLF, analyzed on 03/07/2019


The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.








Synthesis of the vulnerability


An attacker can bypass access restrictions to data via URI CRLF of Python Twisted, in order to obtain sensitive information.Vulnerable products: openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive.Severity of this weakness: 2/4.Consequences of a hack: data reading.Hacker's origin: internet client.Creation date: 03/07/2019.Références of this bulletin: CVE-2019-12387, openSUSE-SU-2019:1760-1, openSUSE-SU-2019:1785-1, SUSE-SU-2019:1731-1, SUSE-SU-2019:2066-1, VIGILANCE-VUL-29682.

Description of the vulnerability


An attacker can bypass access restrictions to data via URI CRLF of Python Twisted, in order to obtain sensitive information.Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service


Vigil@nce provides a networks vulnerabilities announce. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce vulnerability database contains several thousand vulnerabilities.

Support the originator by clicking the read the rest link below.