7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.001 Low
EPSS
Percentile
46.7%
aiohttp is an asynchronous HTTP client/server framework for asyncio and
Python. aiohttp v3.8.4 and earlier are bundled with llhttp v6.0.6.
Vulnerable code is used by aiohttp for its HTTP request parser when
available which is the default case when installing from a wheel. This
vulnerability only affects users of aiohttp as an HTTP server (ie
aiohttp.Application
), you are not affected by this vulnerability if you
are using aiohttp as an HTTP client library (ie aiohttp.ClientSession
).
Sending a crafted HTTP request will cause the server to misinterpret one of
the HTTP header values leading to HTTP request smuggling. This issue has
been addressed in version 3.8.5. Users are advised to upgrade. Users unable
to upgrade can reinstall aiohttp using AIOHTTP_NO_EXTENSIONS=1
as an
environment variable to disable the llhttp HTTP request parser
implementation. The pure Python implementation isn’t vulnerable.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 22.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 23.10 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 24.04 | noarch | python-aiohttp | < any | UNKNOWN |
ubuntu | 16.04 | noarch | python-aiohttp | < any | UNKNOWN |
github.com/aio-libs/aiohttp/blob/v3.8.4/.gitmodules
github.com/aio-libs/aiohttp/commit/9337fb3f2ab2b5f38d7e98a194bde6f7e3d16c40
github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w
hackerone.com/reports/2001873
launchpad.net/bugs/cve/CVE-2023-37276
nvd.nist.gov/vuln/detail/CVE-2023-37276
security-tracker.debian.org/tracker/CVE-2023-37276
www.cve.org/CVERecord?id=CVE-2023-37276