NA

CVE-2024-30251

Published: 02/05/2024 Updated: 02/05/2024

Vulnerability Summary

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.

Vulnerability Trend

Vendor Advisories

Debian Bug report logs - #1070364 python-aiohttp: CVE-2024-30251 Package: src:python-aiohttp; Maintainer for src:python-aiohttp is Debian Python Team <team+python@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 4 May 2024 14:51:04 UTC Severity: important Tags: security, upstream ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2024-30251: DoS in aiohttp <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Sam Bull &lt;9m199i () sambull org ...