Количество 8
Количество 8
BDU:2025-03462
Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему
ROS-20250114-01
Множественные уязвимости python3-aiohttp
CVE-2024-42367
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.
CVE-2024-42367
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.
CVE-2024-42367
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue.
CVE-2024-42367
aiohttp is an asynchronous HTTP client/server framework for asyncio an ...
SUSE-SU-2024:3110-1
Security update for python-aiohttp
GHSA-jwhx-xcg6-8xhj
In aiohttp, compressed files as symlinks are not protected from path traversal
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-03462 Уязвимость HTTP-клиента aiohttp, связанная с проблемасм с символической ссылкой при обработке статических маршрутов, содержащих файлы со сжатыми вариантами в классе FileResponse, позволяющая нарушителю скомпрометировать уязвимую систему | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
ROS-20250114-01 Множественные уязвимости python3-aiohttp | CVSS3: 7.5 | около 1 года назад | ||
CVE-2024-42367 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-42367 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-42367 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing the `Path.stat()` and `Path.open()` to send the file. Version 3.10.2 contains a patch for the issue. | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-42367 aiohttp is an asynchronous HTTP client/server framework for asyncio an ... | CVSS3: 4.8 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:3110-1 Security update for python-aiohttp | 0% Низкий | больше 1 года назад | ||
GHSA-jwhx-xcg6-8xhj In aiohttp, compressed files as symlinks are not protected from path traversal | CVSS3: 4.8 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу