Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6wp-4m6f-gcjg

Опубликовано: 26 фев. 2021
Источник: github
Github: Прошло ревью
CVSS4: 2.3
CVSS3: 3.1

Описание

aiohttp Open Redirect vulnerability (normalize_path_middleware middleware)

Impact

Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website.

It is caused by a bug in the aiohttp.web_middlewares.normalize_path_middleware middleware.

Patches

This security problem has been fixed in v3.7.4. Upgrade your dependency as follows: pip install aiohttp >= 3.7.4

Workarounds

If upgrading is not an option for you, a workaround can be to avoid using aiohttp.web_middlewares.normalize_path_middleware in your applications.

References

For more information

If you have any questions or comments about this advisory:

Credit: Jelmer Vernooij and Beast Glatisant.

Пакеты

Наименование

aiohttp

pip
Затронутые версииВерсия исправления

< 3.7.4

3.7.4

EPSS

Процентиль: 65%
0.00486
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 3.1
ubuntu
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

CVSS3: 8.2
redhat
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

CVSS3: 3.1
nvd
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

CVSS3: 3.1
debian
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
почти 5 лет назад

Security update for python-aiohttp

EPSS

Процентиль: 65%
0.00486
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-601