aiohttp 的 HTTP 解析器(Python 解析器,不是 llhttp)对于分隔符仍然过于宽松 (CVE-2024-23829)

admin 2024-02-01 09:18:28 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
aiohttp 的 HTTP 解析器(Python 解析器,不是 llhttp)对于分隔符仍然过于宽松 (CVE-2024-23829)

CVE编号

CVE-2024-23829

利用情况

暂无

补丁情况

N/A

披露时间

2024-01-30
漏洞描述
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827
https://github.com/aio-libs/aiohttp/pull/8074
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 fedora_38 python-aiohttp * Up to (excluding) 3.9.3-1.fc38
运行在以下环境
系统 fedora_39 python-aiohttp * Up to (excluding) 3.9.3-1.fc39
运行在以下环境
系统 fedora_EPEL_9 python-aiohttp * Up to (excluding) 3.9.3-1.el9
CVSS3评分 6.5
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 低
  • 保密性 无
  • 完整性 低
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CWE-ID 漏洞类型
CWE-444 HTTP请求的解释不一致性(HTTP请求私运)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0