CVE-2024-23829

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827 - Patch () https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827 - Patch
References () https://github.com/aio-libs/aiohttp/pull/8074 - Patch () https://github.com/aio-libs/aiohttp/pull/8074 - Patch
References () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 - Exploit, Patch, Vendor Advisory () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 - Exploit, Patch, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - Mailing List

09 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/ -

06 Feb 2024, 18:38

Type Values Removed Values Added
References () https://github.com/aio-libs/aiohttp/pull/8074 - () https://github.com/aio-libs/aiohttp/pull/8074 - Patch
References () https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827 - () https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827 - Patch
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - Mailing List
References () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 - () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 - Exploit, Patch, Vendor Advisory
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*
First Time Aiohttp aiohttp
Fedoraproject
Fedoraproject fedora
Aiohttp
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

05 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ -

29 Jan 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-29 23:15

Updated : 2024-11-21 08:58


NVD link : CVE-2024-23829

Mitre link : CVE-2024-23829

CVE.ORG link : CVE-2024-23829


JSON object : View

Products Affected

aiohttp

  • aiohttp

fedoraproject

  • fedora
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')