CVE-2022-24801
Python vulnerability analysis and mitigation

Overview

The vulnerability CVE-2022-24801 affects the Twisted Web HTTP 1.1 server, specifically in the twisted.web.http module, prior to version 22.4.0rc1. The vulnerability was discovered and disclosed in April 2022, where the server was found to parse several HTTP request constructs more leniently than permitted by RFC 7230. This affected the core HTTP parsing functionality in Twisted, an event-based framework for internet applications supporting Python 3.6+ (GitHub Advisory).

Technical details

The vulnerability stems from multiple non-conformant HTTP parsing issues: Content-Length header values could have + or - prefixes, illegal characters were permitted in chunked extensions (including LF character), chunk lengths in hexadecimal format could have a 0x prefix, and HTTP headers were stripped of all leading and trailing ASCII whitespace instead of only space and HTAB characters. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 HIGH with vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The non-conformant parsing can lead to request desync when requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. This is particularly concerning for systems that use Twisted Web's HTTP 1.1 server or proxy in combination with different HTTP servers or proxies. The vulnerability could allow attackers to bypass request validation or access control mechanisms implemented at the proxy level (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Twisted version 22.4.0rc1 or later, which addresses the vulnerability. For systems that cannot immediately upgrade, two alternative workarounds are available: ensure any vulnerabilities in upstream proxies have been addressed through updates, or filter malformed requests using other means, such as configuring an upstream proxy. The HTTP 2.0 server and Twisted Web client are not affected by this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-35615CRITICAL9.2
  • PythonPython
  • praisonai
NoYesApr 06, 2026
CVE-2026-39305CRITICAL9
  • PythonPython
  • praisonai
NoYesApr 06, 2026
CVE-2026-39307HIGH8.1
  • PythonPython
  • praisonai
NoYesApr 06, 2026
CVE-2026-39306HIGH7.3
  • PythonPython
  • praisonai
NoYesApr 06, 2026
CVE-2026-39308HIGH7.1
  • PythonPython
  • praisonai
NoYesApr 06, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management