Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-30251

Опубликовано: 02 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

РелизСтатусПримечание
devel

not-affected

3.11.16-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

released

3.6.2-1ubuntu1+esm4
esm-apps/jammy

released

3.8.1-4ubuntu0.2+esm1
esm-apps/noble

released

3.9.1-1ubuntu0.1+esm1
esm-apps/xenial

not-affected

code not present
focal

ignored

end of standard support, was needs-triage
jammy

needed

mantic

ignored

end of life, was needs-triage
noble

needed

Показывать по

EPSS

Процентиль: 52%
0.00295
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

CVSS3: 7.5
nvd
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

CVSS3: 7.5
debian
больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
9 месяцев назад

Security update for python-aiohttp

suse-cvrf
9 месяцев назад

Security update for python-aiohttp

EPSS

Процентиль: 52%
0.00295
Низкий

7.5 High

CVSS3