Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-23829
HistoryJan 29, 2024 - 11:15 p.m.

Security feature bypass

2024-01-2923:15:00
PRIOn knowledge base
www.prio-n.com
10
aiohttp
asynchronous
python
http parser
security-sensitive
proxy
injection
request smuggling
exception handling
vulnerability
cve-2023-47627
fix

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.6%

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

CPENameOperatorVersion
aiohttplt3.9.2
fedoraeq39