Логотип exploitDog
bind: "CVE-2024-23334"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-23334"

Количество 8

Количество 8

ubuntu логотип

CVE-2024-23334

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
EPSS: Критический
redhat логотип

CVE-2024-23334

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
EPSS: Критический
nvd логотип

CVE-2024-23334

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
EPSS: Критический
debian логотип

CVE-2024-23334

больше 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.9
EPSS: Критический
github логотип

GHSA-5h86-8mv2-jq9f

больше 1 года назад

aiohttp is vulnerable to directory traversal

CVSS3: 5.9
EPSS: Критический
fstec логотип

BDU:2024-00995

больше 1 года назад

Уязвимость HTTP-клиента aiohttp, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2024:0577-1

больше 1 года назад

Security update for python-aiohttp, python-time-machine

EPSS: Низкий
redos логотип

ROS-20240423-07

около 1 года назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-23334

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
94%
Критический
больше 1 года назад
redhat логотип
CVE-2024-23334

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
94%
Критический
больше 1 года назад
nvd логотип
CVE-2024-23334

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

CVSS3: 5.9
94%
Критический
больше 1 года назад
debian логотип
CVE-2024-23334

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.9
94%
Критический
больше 1 года назад
github логотип
GHSA-5h86-8mv2-jq9f

aiohttp is vulnerable to directory traversal

CVSS3: 5.9
94%
Критический
больше 1 года назад
fstec логотип
BDU:2024-00995

Уязвимость HTTP-клиента aiohttp, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
94%
Критический
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0577-1

Security update for python-aiohttp, python-time-machine

больше 1 года назад
redos логотип
ROS-20240423-07

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
около 1 года назад

Уязвимостей на страницу