Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310114552
HistoryMay 07, 2024 - 12:00 a.m.

aiohttp < 3.8.5 HTTP Request Smuggling Vulnerability - Linux

2024-05-0700:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
4
aiohttp
http request smuggling
linux
vulnerability
cve-2023-30589
cve-2023-37276
web servers
security advisory
version 3.8.5

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.3%

aiohttp is prone to a HTTP request smuggling vulnerability.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:aio-libs_project:aiohttp";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.114552");
  script_version("2024-05-08T05:05:32+0000");
  script_cve_id("CVE-2023-30589", "CVE-2023-37276");
  script_tag(name:"last_modification", value:"2024-05-08 05:05:32 +0000 (Wed, 08 May 2024)");
  script_tag(name:"creation_date", value:"2024-05-07 08:55:56 +0000 (Tue, 07 May 2024)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:C/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-07-28 15:55:35 +0000 (Fri, 28 Jul 2023)");
  script_name("aiohttp < 3.8.5 HTTP Request Smuggling Vulnerability - Linux");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Web Servers");
  script_dependencies("gb_aiohttp_http_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("aio-libs_project/aiohttp/detected", "Host/runs_unixoide");

  script_xref(name:"URL", value:"https://github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w");

  script_tag(name:"summary", value:"aiohttp is prone to a HTTP request smuggling vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"aiohttp.web.Application is vulnerable to HTTP request smuggling
  via llhttp HTTP request parser.

  aiohttp is bundled with llhttp which is vulnerable to CVE-2023-30589. The vulnerable code is used
  by aiohttp for its HTTP request parser when available which is the default case when installing
  from a wheel.");

  script_tag(name:"affected", value:"aiohttp versions prior to 3.8.5.");

  script_tag(name:"solution", value:"Update to version 3.8.5 or later.");

  # nb: No major Linux distributions seems to have backport coverage. We're still using a low QoD
  # here as on Linux the llhttp lib is most likely updated separately...
  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if( version_is_less( version:version, test_version:"3.8.5" ) ) {
  report = report_fixed_ver( installed_version:version, fixed_version:"3.8.5", install_path:location );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.3%