Lucene search

K
redhatcveRedhat.comRH:CVE-2023-47641
HistoryNov 16, 2023 - 10:46 p.m.

CVE-2023-47641

2023-11-1622:46:23
redhat.com
access.redhat.com
23
aiohttp
http request smuggling
content-length
transfer-encoding
proxy rules
authentication headers
open redirect

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%

Aiohttp is susceptible to an HTTP request smuggling vulnerability due to inadequate parsing of the HTTP Content-Length (CL) and Transfer-Encoding (TE) headers. This flaw allows an attacker to bypass proxy rules, poisoning sockets to other users, such as passing Authentication Headers. Additionally, if an open redirect is present, the attacker can leverage it to redirect random users to their website and log the requests.

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.0%