Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21330
HistoryFeb 26, 2021 - 2:15 a.m.

CVE-2021-21330 Open redirect vulnerability in aiohttp

2021-02-2602:15:15
CWE-601
GitHub_M
www.cve.org
2

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.9%

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the aiohttp.web_middlewares.normalize_path_middleware middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows “pip install aiohttp >= 3.7.4”. If upgrading is not an option for you, a workaround can be to avoid using aiohttp.web_middlewares.normalize_path_middleware in your applications.

CNA Affected

[
  {
    "product": "aiohttp",
    "vendor": "aio-libs",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.7.4"
      }
    ]
  }
]

3.1 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.9%