Source: python-tornado
Version: 6.5.2-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for python-tornado.

CVE-2025-67724[0]:
| Tornado is a Python web framework and asynchronous networking
| library. In versions 6.5.2 and below, the supplied reason phrase is
| used unescaped in HTTP headers (where it could be used for header
| injection) or in HTML in the default error page (where it could be
| used for XSS) and can be exploited by passing untrusted or malicious
| data into the reason argument. Used by both
| RequestHandler.set_status and tornado.web.HTTPError, the argument is
| designed to allow applications to pass custom "reason" phrases (the
| "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line
| (mainly for non-standard status codes). This issue is fixed in
| version 6.5.3.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-67724
    https://www.cve.org/CVERecord?id=CVE-2025-67724
[1] 
https://github.com/tornadoweb/tornado/security/advisories/GHSA-pr2v-jx2c-wg9f
[2] 
https://github.com/tornadoweb/tornado/commit/9c163aebeaad9e6e7d28bac1f33580eb00b0e421

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to