Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-21330

Опубликовано: 26 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 3.1

Описание

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the aiohttp.web_middlewares.normalize_path_middleware middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using aiohttp.web_middlewares.normalize_path_middleware in your applications.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.7.4-1
esm-apps/bionic

released

3.0.1-1ubuntu0.1~esm1
esm-apps/focal

released

3.6.2-1ubuntu0.1~esm1
esm-apps/jammy

not-affected

3.7.4-1
esm-apps/noble

not-affected

3.7.4-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 65%
0.00486
Низкий

5.8 Medium

CVSS2

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

CVSS3: 3.1
nvd
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

CVSS3: 3.1
debian
почти 5 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
почти 5 лет назад

Security update for python-aiohttp

suse-cvrf
больше 3 лет назад

Recommended update for python-aiohttp, python-typing_extensions

EPSS

Процентиль: 65%
0.00486
Низкий

5.8 Medium

CVSS2

3.1 Low

CVSS3