Логотип exploitDog
bind:CVE-2024-42367
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42367

Количество 8

Количество 8

ubuntu логотип

CVE-2024-42367

около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
redhat логотип

CVE-2024-42367

около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2024-42367

около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
EPSS: Низкий
debian логотип

CVE-2024-42367

около 1 года назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 4.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3110-1

около 1 года назад

Security update for python-aiohttp

EPSS: Низкий
github логотип

GHSA-jwhx-xcg6-8xhj

около 1 года назад

In aiohttp, compressed files as symlinks are not protected from path traversal

CVSS3: 4.8
EPSS: Низкий
fstec логотип

BDU:2025-03462

около 1 года назад

Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему

CVSS3: 4.8
EPSS: Низкий
redos логотип

ROS-20250114-01

8 месяцев назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.

CVSS3: 4.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-42367

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 4.8
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3110-1

Security update for python-aiohttp

0%
Низкий
около 1 года назад
github логотип
GHSA-jwhx-xcg6-8xhj

In aiohttp, compressed files as symlinks are not protected from path traversal

CVSS3: 4.8
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-03462

Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему

CVSS3: 4.8
0%
Низкий
около 1 года назад
redos логотип
ROS-20250114-01

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
8 месяцев назад

Уязвимостей на страницу