Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8495-4g3g-x7pr

Опубликовано: 18 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.3

Описание

aiohttp allows request smuggling due to incorrect parsing of chunk extensions

Summary

The Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions.

Impact

If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.


Patch: https://github.com/aio-libs/aiohttp/commit/259edc369075de63e6f3a4eaade058c62af0df71

Пакеты

Наименование

aiohttp

pip
Затронутые версииВерсия исправления

<= 3.10.10

3.10.11

EPSS

Процентиль: 38%
0.00164
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-444

Связанные уязвимости

ubuntu
7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 5.9
redhat
7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

nvd
7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

debian
7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
7 месяцев назад

Security update for python-aiohttp

EPSS

Процентиль: 38%
0.00164
Низкий

6.3 Medium

CVSS4

Дефекты

CWE-444