Логотип exploitDog
bind:"CVE-2024-52304"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-52304"

Количество 9

Количество 9

ubuntu логотип

CVE-2024-52304

7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

EPSS: Низкий
redhat логотип

CVE-2024-52304

7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-52304

7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

EPSS: Низкий
debian логотип

CVE-2024-52304

7 месяцев назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4110-1

7 месяцев назад

Security update for python-aiohttp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4077-1

7 месяцев назад

Security update for python-aiohttp

EPSS: Низкий
github логотип

GHSA-8495-4g3g-x7pr

7 месяцев назад

aiohttp allows request smuggling due to incorrect parsing of chunk extensions

EPSS: Низкий
fstec логотип

BDU:2024-10292

7 месяцев назад

Уязвимость HTTP-клиента aiohttp, связанная с недостатками обработки заголовков HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250114-01

5 месяцев назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-52304

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

0%
Низкий
7 месяцев назад
redhat логотип
CVE-2024-52304

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

CVSS3: 5.9
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2024-52304

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

0%
Низкий
7 месяцев назад
debian логотип
CVE-2024-52304

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4110-1

Security update for python-aiohttp

0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:4077-1

Security update for python-aiohttp

0%
Низкий
7 месяцев назад
github логотип
GHSA-8495-4g3g-x7pr

aiohttp allows request smuggling due to incorrect parsing of chunk extensions

0%
Низкий
7 месяцев назад
fstec логотип
BDU:2024-10292

Уязвимость HTTP-клиента aiohttp, связанная с недостатками обработки заголовков HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
0%
Низкий
7 месяцев назад
redos логотип
ROS-20250114-01

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
5 месяцев назад

Уязвимостей на страницу