NA

CVE-2023-49081

Published: 30/11/2023 Updated: 29/01/2024
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an malicious user to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.

Vulnerable Product Search on Vulmon Subscribe to Product

aiohttp aiohttp

Vendor Advisories

Debian Bug report logs - #1057163 python-aiohttp: CVE-2023-49081 Package: src:python-aiohttp; Maintainer for src:python-aiohttp is Debian Python Team <team+python@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 30 Nov 2023 21:45:04 UTC Severity: important Tags: security, upstream ...
Description<!---->A flaw was found in the python-aiohttp package This issue could allow a remote attacker to modify an existing HTTP request or create a new request that could have minor confidentiality or integrity impactsA flaw was found in the python-aiohttp package This issue could allow a remote attacker to modify an existing HTTP request o ...