Логотип exploitDog
bind: "CVE-2024-42367"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-42367"

Количество 8

Количество 8

ubuntu логотип

CVE-2024-42367

10 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
redhat логотип

CVE-2024-42367

11 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2024-42367

10 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
debian логотип

CVE-2024-42367

10 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 4.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3110-1

10 месяцев назад

Security update for python-aiohttp

EPSS: Низкий
github логотип

GHSA-jwhx-xcg6-8xhj

11 месяцев назад

In aiohttp, compressed files as symlinks are not protected from path traversal

CVSS3: 4.8
EPSS: Низкий
fstec логотип

BDU:2025-03462

11 месяцев назад

Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему

CVSS3: 4.8
EPSS: Низкий
redos логотип

ROS-20250114-01

5 месяцев назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 4.8
0%
Низкий
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3110-1

Security update for python-aiohttp

0%
Низкий
10 месяцев назад
github логотип
GHSA-jwhx-xcg6-8xhj

In aiohttp, compressed files as symlinks are not protected from path traversal

CVSS3: 4.8
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-03462

Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему

CVSS3: 4.8
0%
Низкий
11 месяцев назад
redos логотип
ROS-20250114-01

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
5 месяцев назад

Уязвимостей на страницу