Aio-Libs Aiohttp vulnerabilities

32 known vulnerabilities affecting aio-libs/aiohttp.

Total CVEs
32
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
HIGH6MEDIUM17LOW9

Vulnerabilities

Page 2 of 2
CVE-2024-52304MEDIUMCVSS 6.3fixed in 3.10.112024-11-18
CVE-2024-52304 [MEDIUM] CWE-444 CVE-2024-52304: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.1 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO
cvelistv5nvd
CVE-2024-42367MEDIUMCVSS 4.8v>= 3.10.0b1, < 3.10.22024-08-12
CVE-2024-42367 [MEDIUM] CWE-61 CVE-2024-42367: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions on the 3.10 branch prior to version 3.10.2, static routes which contain files with compressed variants (`.gz` or `.br` extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static route
cvelistv5nvd
CVE-2024-30251HIGHCVSS 7.5fixed in 3.9.42024-05-02
CVE-2024-30251 [HIGH] CWE-835 CVE-2024-30251: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving r
cvelistv5nvd
CVE-2024-27306MEDIUMCVSS 6.1fixed in 3.9.42024-04-18
CVE-2024-27306 [MEDIUM] CWE-79 CVE-2024-27306: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected. Other users can disab
cvelistv5nvd
CVE-2024-23334HIGHCVSS 7.5ExploitedPoCfixed in 3.9.22024-01-29
CVE-2024-23334 [HIGH] CWE-22 CVE-2024-23334: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp a aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_
cvelistv5nvd
CVE-2024-23829MEDIUMCVSS 5.3fixed in 3.9.22024-01-29
CVE-2024-23829 [MEDIUM] CWE-444 aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators aiohttp's HTTP parser (the python one, not llhttp) still overly lenient about separators aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect aga
cvelistv5
CVE-2023-49081MEDIUMCVSS 5.3fixed in 3.9.02023-11-30
CVE-2023-49081 [MEDIUM] CWE-20 CVE-2023-49081: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request.
cvelistv5nvd
CVE-2023-49082MEDIUMCVSS 5.3fixed in 3.9.02023-11-29
CVE-2023-49082 [MEDIUM] CWE-20 CVE-2023-49082: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.
cvelistv5nvd
CVE-2023-47627HIGHCVSS 7.5fixed in 3.9.22023-11-14
CVE-2023-47627 [HIGH] CWE-444 CVE-2023-47627: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in A aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been
cvelistv5nvd
CVE-2023-47641MEDIUMCVSS 6.5fixed in 3.8.02023-11-14
CVE-2023-47641 [MEDIUM] CWE-444 CVE-2023-47641: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp have a security vulnerability regarding the inconsistent interpretation of the http protocol. HTTP/1.1 is a persistent protocol, if both Content-Length(CL) and Transfer-Encoding(TE) header values are present it can lead to incorrect interpret
cvelistv5nvd
CVE-2023-37276HIGHCVSS 7.5fixed in 3.8.52023-07-19
CVE-2023-37276 [HIGH] CWE-444 CVE-2023-37276: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. aiohttp v3.8.4 and e aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. aiohttp v3.8.4 and earlier are bundled with llhttp v6.0.6. Vulnerable code is used by aiohttp for its HTTP request parser when available which is the default case when installing from a wheel. This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.
cvelistv5nvd
CVE-2021-21330MEDIUMCVSS 6.1fixed in 3.7.42021-02-26
CVE-2021-21330 [MEDIUM] CWE-601 CVE-2021-21330: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before ve aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middlewa
cvelistv5nvd