Bug 2249825 (CVE-2023-47627)

Summary: CVE-2023-47627 python-aiohttp: numerous issues in HTTP parser with header parsing
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbuckingham, bcourt, davidn, ehelms, epacific, gtanzill, jcammara, jhardy, jneedle, jobarker, jsherril, lzap, mabashia, mhulan, mminar, nmoumoul, orabin, pcreech, rbiba, rchan, simaishi, smcdonal, sskracic, teagle, yguenane, zsadeh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: aiohttp 3.8.6 Doc Type: If docs needed, set a value
Doc Text:
An HTTP request smuggling vulnerability was found in aiohttp. Numerous issues with HTTP parsing can allow an attacker to smuggle HTTP requests.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2250617, 2250618, 2249828, 2249829, 2249830, 2249831, 2250614, 2250615, 2250616, 2250619, 2250620, 2260419    
Bug Blocks: 2249832    

Description TEJ RATHI 2023-11-15 13:53:40 UTC
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.

https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg
https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d

Comment 2 ybuenos 2023-11-20 07:23:04 UTC
Created pymodbus tracking bugs for this issue:

Affects: fedora-all [bug 2250619]


Created python-afsapi tracking bugs for this issue:

Affects: epel-all [bug 2250616]


Created python-aiohttp tracking bugs for this issue:

Affects: epel-all [bug 2250614]
Affects: fedora-all [bug 2250615]


Created python-discord tracking bugs for this issue:

Affects: epel-all [bug 2250617]


Created python-idna-ssl tracking bugs for this issue:

Affects: epel-all [bug 2250618]


Created python-pytelegrambotapi tracking bugs for this issue:

Affects: fedora-all [bug 2250620]

Comment 3 errata-xmlrpc 2024-02-29 19:41:43 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:1057 https://access.redhat.com/errata/RHSA-2024:1057

Comment 4 errata-xmlrpc 2024-03-27 13:18:55 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.14 for RHEL 8

Via RHSA-2024:1536 https://access.redhat.com/errata/RHSA-2024:1536

Comment 5 errata-xmlrpc 2024-04-02 19:30:03 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.4 for RHEL 9
  Red Hat Ansible Automation Platform 2.4 for RHEL 8

Via RHSA-2024:1640 https://access.redhat.com/errata/RHSA-2024:1640

Comment 6 errata-xmlrpc 2024-04-18 01:51:53 UTC
This issue has been addressed in the following products:

  RHUI 4 for RHEL 8

Via RHSA-2024:1878 https://access.redhat.com/errata/RHSA-2024:1878

Comment 7 errata-xmlrpc 2024-04-23 17:15:40 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.15 for RHEL 8

Via RHSA-2024:2010 https://access.redhat.com/errata/RHSA-2024:2010