CVE-2023-47627
Request smuggling in aiohttp
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.
aiohttp es un framework cliente/servidor HTTP asíncrono para asyncio y Python. El analizador HTTP en AIOHTTP tiene numerosos problemas con el análisis de encabezados, lo que podría provocar contrabando de solicitudes. Este analizador solo se usa cuando AIOHTTP_NO_EXTENSIONS está habilitado (o no se usa una rueda prediseñada). Estos errores se solucionaron en el commit`d5c12ba89` que se incluyó en la versión 3.8.6. Se recomienda a los usuarios que actualicen. No se conocen workarounds para estos problemas.
An HTTP request smuggling vulnerability was found in aiohttp. Numerous issues with HTTP parsing can allow an attacker to smuggle HTTP requests.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-11-07 CVE Reserved
- 2023-11-14 CVE Published
- 2024-10-11 CVE Updated
- 2024-10-11 First Exploit
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CAPEC
References (7)
URL | Date | SRC |
---|---|---|
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg | 2024-10-11 |
URL | Date | SRC |
---|---|---|
https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d | 2024-02-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-47627 | 2024-04-23 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2249825 | 2024-04-23 |