Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-42367

Опубликовано: 12 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.8

Описание

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (.gz or .br extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when follow_symlinks=False (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the FileResponse class, and symbolic links are then automatically followed when performing the Path.stat() and Path.open() to send the file. Version 3.10.2 contains a patch for the issue.

РелизСтатусПримечание
devel

not-affected

3.11.16-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-apps/xenial

not-affected

code not present
focal

ignored

end of standard support, was needs-triage
jammy

not-affected

code not present
noble

not-affected

code not present
oracular

ignored

end of life, was needed

Показывать по

EPSS

Процентиль: 50%
0.00267
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
nvd
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
debian
около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

suse-cvrf
около 1 года назад

Security update for python-aiohttp

CVSS3: 4.8
github
около 1 года назад

In aiohttp, compressed files as symlinks are not protected from path traversal

EPSS

Процентиль: 50%
0.00267
Низкий

4.8 Medium

CVSS3