Логотип exploitDog
bind: "CVE-2024-23829"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-23829"

Количество 9

Количество 9

ubuntu логотип

CVE-2024-23829

почти 2 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-23829

почти 2 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-23829

почти 2 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-23829

3 месяца назад

aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators

EPSS: Низкий
debian логотип

CVE-2024-23829

почти 2 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-8qpw-xqxj-h4r2

почти 2 года назад

aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-00996

почти 2 года назад

Уязвимость HTTP-клиента aiohttp, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0577-1

почти 2 года назад

Security update for python-aiohttp, python-time-machine

EPSS: Низкий
redos логотип

ROS-20240423-07

больше 1 года назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-23829

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-23829

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-23829

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2024-23829

aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators

0%
Низкий
3 месяца назад
debian логотип
CVE-2024-23829

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 6.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-8qpw-xqxj-h4r2

aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators

CVSS3: 6.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-00996

Уязвимость HTTP-клиента aiohttp, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"

CVSS3: 6.5
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2024:0577-1

Security update for python-aiohttp, python-time-machine

почти 2 года назад
redos логотип
ROS-20240423-07

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
больше 1 года назад

Уязвимостей на страницу