Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8495-4g3g-x7pr

Опубликовано: 18 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.3

Описание

aiohttp allows request smuggling due to incorrect parsing of chunk extensions

Summary

The Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions.

Impact

If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.


Patch: https://github.com/aio-libs/aiohttp/commit/259edc369075de63e6f3a4eaade058c62af0df71

Пакеты

Наименование

aiohttp

pip
Затронутые версииВерсия исправления

<= 3.10.10

3.10.11

EPSS

Процентиль: 63%
0.00456
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 5.9
redhat
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 7.5
nvd
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 7.5
debian
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
около 1 года назад

Security update for python-aiohttp

EPSS

Процентиль: 63%
0.00456
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-444