Lucene search

K
redosRedosROS-20240423-07
HistoryApr 23, 2024 - 12:00 a.m.

ROS-20240423-07

2024-04-2300:00:00
redos.red-soft.ru
5
aiohttp
http client
vulnerability
remote attackers
unauthorized access
restricted access
protection
information
path name
http requests
exploitation
http request smuggling
attack
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.052 Low

EPSS

Percentile

92.9%

The aiohttp HTTP client vulnerability is related to an incorrect restriction of the path name to a directory with restricted
access. Exploitation of the vulnerability could allow an attacker acting remotely to gain
unauthorized access to protected information

The aiohttp HTTP client vulnerability is related to flaws in processing HTTP requests. Exploitation of the vulnerability
could allow a remote attacker to perform the “HTTP request smuggling” attack

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64python3-aiohttp<= 3.9.3-1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.052 Low

EPSS

Percentile

92.9%