Логотип exploitDog
bind:"GHSA-qvrw-v9rv-5rjx" OR bind:"CVE-2023-49082"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-qvrw-v9rv-5rjx" OR bind:"CVE-2023-49082"

Количество 8

Количество 8

github логотип

GHSA-qvrw-v9rv-5rjx

около 2 лет назад

aiohttp's ClientSession is vulnerable to CRLF injection via method

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-49082

около 2 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-49082

около 2 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-49082

около 2 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-49082

около 2 лет назад

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0168-1

почти 2 года назад

Security update for python-aiohttp

EPSS: Низкий
fstec логотип

BDU:2023-08273

около 2 лет назад

Уязвимость HTTP-клиента aiohttp, связанная с непринятием мер по нейтрализации последовательностей CRLF, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240318-01

больше 1 года назад

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-qvrw-v9rv-5rjx

aiohttp's ClientSession is vulnerable to CRLF injection via method

CVSS3: 5.3
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-49082

aiohttp is an asynchronous HTTP client/server framework for asyncio an ...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0168-1

Security update for python-aiohttp

0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-08273

Уязвимость HTTP-клиента aiohttp, связанная с непринятием мер по нейтрализации последовательностей CRLF, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redos логотип
ROS-20240318-01

Множественные уязвимости python3-aiohttp

CVSS3: 7.5
больше 1 года назад

Уязвимостей на страницу