NA

CVE-2023-49082

Published: 29/11/2023 Updated: 29/01/2024
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an malicious user to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.

Vulnerable Product Search on Vulmon Subscribe to Product

aiohttp aiohttp

Vendor Advisories

Debian Bug report logs - #1057164 python-aiohttp: CVE-2023-49082 Package: src:python-aiohttp; Maintainer for src:python-aiohttp is Debian Python Team <team+python@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 30 Nov 2023 21:48:02 UTC Severity: important Tags: security, upstream ...
DescriptionThe MITRE CVE dictionary describes this issue as: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python Improper validation makes it possible for an attacker to modify the HTTP request (eg insert a new header) or even create a new HTTP request if the attacker controls the HTTP method The vulnerability occurs ...