6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.01 Low
EPSS
Percentile
83.7%
aiohttp is an asynchronous HTTP client/server framework for asyncio and
Python. In aiohttp before version 3.7.4 there is an open redirect
vulnerability. A maliciously crafted link to an aiohttp-based web-server
could redirect the browser to a different website. It is caused by a bug in
the aiohttp.web_middlewares.normalize_path_middleware
middleware. This
security problem has been fixed in 3.7.4. Upgrade your dependency using pip
as follows “pip install aiohttp >= 3.7.4”. If upgrading is not an option
for you, a workaround can be to avoid using
aiohttp.web_middlewares.normalize_path_middleware
in your applications.
Author | Note |
---|---|
sbeattie | vuln introduced in upstream commit 8c44b2189d24c1c9f94d6733b5038761451fb3bc (v1.3.0) |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-aiohttp | < 3.0.1-1ubuntu0.1~esm1 | UNKNOWN |
ubuntu | 20.04 | noarch | python-aiohttp | < 3.6.2-1ubuntu1+esm1 | UNKNOWN |
github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25
github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b
github.com/aio-libs/aiohttp/issues/5497
github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg
launchpad.net/bugs/cve/CVE-2021-21330
nvd.nist.gov/vuln/detail/CVE-2021-21330
pypi.org/project/aiohttp/
security-tracker.debian.org/tracker/CVE-2021-21330
ubuntu.com/security/notices/USN-5386-1
www.cve.org/CVERecord?id=CVE-2021-21330
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.01 Low
EPSS
Percentile
83.7%