7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.8 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
31.6%
aiohttp is an asynchronous HTTP client/server framework for asyncio and
Python. Security-sensitive parts of the Python HTTP parser retained minor
differences in allowable character sets, that must trigger error handling
to robustly match frame boundaries of proxies in order to protect against
injection of additional requests. Additionally, validation could trigger
exceptions that were not handled consistently with processing of other
malformed input. Being more lenient than internet standards require could,
depending on deployment environment, assist in request smuggling. The
unhandled exception could cause excessive resource consumption on the
application server and/or its logging facilities. This vulnerability exists
due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this
vulnerability.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
mdeslaur | starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 22.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 23.10 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 24.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 16.04 | noarch | python-aiohttp | < any | UNKNOWN |
github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827
github.com/aio-libs/aiohttp/pull/8074
github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2
launchpad.net/bugs/cve/CVE-2024-23829
nvd.nist.gov/vuln/detail/CVE-2024-23829
security-tracker.debian.org/tracker/CVE-2024-23829
www.cve.org/CVERecord?id=CVE-2024-23829
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
6.8 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
31.6%