Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-42367

Опубликовано: 12 авг. 2024
Источник: nvd
CVSS3: 4.8
EPSS Низкий

Описание

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (.gz or .br extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when follow_symlinks=False (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the FileResponse class, and symbolic links are then automatically followed when performing the Path.stat() and Path.open() to send the file. Version 3.10.2 contains a patch for the issue.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*
Версия от 3.10.0 (включая) до 3.10.2 (исключая)

EPSS

Процентиль: 57%
0.00352
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-61

Связанные уязвимости

CVSS3: 4.8
ubuntu
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
redhat
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
debian
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
больше 1 года назад

Security update for python-aiohttp

CVSS3: 4.8
github
больше 1 года назад

In aiohttp, compressed files as symlinks are not protected from path traversal

EPSS

Процентиль: 57%
0.00352
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-61