Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27306

Опубликовано: 18 апр. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected. Other users can disable show_index if unable to upgrade.

A flaw was found in aiohttp, an asynchronous HTTP client/server framework for asyncio and Python. When using "web.static(..., show_index=True)", the resulting index pages do not escape file names. If users can upload files with arbitrary filenames to the static directory, the server is vulnerable to cross-site scripting (XSS) attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2ansible-towerOut of support scope
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-dellemc-openmanage-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-minimal-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/ee-supported-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-24/platform-resource-runner-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ansible-builder-rhel8Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-25/ee-cloud-services-rhel9Not affected
Red Hat Ansible Automation Platform 2automation-controllerNot affected
Red Hat Ansible Automation Platform 2.4 for RHEL 8python3x-aiohttpFixedRHSA-2024:378110.06.2024
Red Hat Ansible Automation Platform 2.4 for RHEL 9python-aiohttpFixedRHSA-2024:378110.06.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
Дефект:
CWE-80
https://bugzilla.redhat.com/show_bug.cgi?id=2275989aiohttp: XSS on index pages for static file handling

EPSS

Процентиль: 34%
0.00132
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected. Other users can disable `show_index` if unable to upgrade.

CVSS3: 6.1
nvd
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected. Other users can disable `show_index` if unable to upgrade.

CVSS3: 6.1
debian
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
6 месяцев назад

Security update for python-aiohttp

suse-cvrf
около 1 года назад

Security update for python-aiohttp

EPSS

Процентиль: 34%
0.00132
Низкий

6.1 Medium

CVSS3