aiohttp@3.9.5 vulnerabilities

Async http client/server framework (asyncio)

  • latest version

    3.11.17

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the aiohttp package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    HTTP Request Smuggling

    Affected versions of this package are vulnerable to HTTP Request Smuggling due to incorrect parsing of newlines in chunk extensions via the feed_data function. An attacker can bypass firewall or proxy protections by sending specially crafted requests.

    Note:

    Exploiting this vulnerability is possible when a pure Python version of aiohttp is installed (Without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled.

    How to fix HTTP Request Smuggling?

    Upgrade aiohttp to version 3.10.11 or higher.

    [,3.10.11)
    • M
    UNIX Symbolic Link (Symlink) Following

    Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following through the FileResponse class due to improper validation for compressed variants. An attacker can access files outside the intended directory by manipulating symbolic links to point to restricted areas by performing Path.stat() and Path.open() to send the file.

    Note

    This vulnerability impacts servers with static routes that contain compressed variants as symbolic links pointing outside the root directory or that permit users to upload or create such links.

    How to fix UNIX Symbolic Link (Symlink) Following?

    Upgrade aiohttp to version 3.10.2 or higher.

    [,3.10.2)