Bug 2224185 (CVE-2023-37276) - CVE-2023-37276 python-aiohttp: HTTP request smuggling via llhttp HTTP request parser
Summary: CVE-2023-37276 python-aiohttp: HTTP request smuggling via llhttp HTTP request...
Keywords:
Status: NEW
Alias: CVE-2023-37276
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2224228 2224226 2224227 2260418
Blocks: 2224192
TreeView+ depends on / blocked
 
Reported: 2023-07-20 07:04 UTC by Marian Rehak
Modified: 2024-04-23 17:11 UTC (History)
40 users (show)

Fixed In Version: aiohttp 3.8.5
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in aio-libs aiohttp, where it is vulnerable to HTTP request smuggling, caused by a flaw in the aiohttp.web.Application. By sending a specially crafted HTTP(S) request, an attacker can poison the web cache, bypass web application firewall protection, and conduct Cross-site scripting (XSS) attacks.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:1878 0 None None None 2024-04-18 01:51:44 UTC
Red Hat Product Errata RHSA-2024:2010 0 None None None 2024-04-23 17:11:51 UTC

Description Marian Rehak 2023-07-20 07:04:05 UTC
This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.Application`), you are not affected by this vulnerability if you are using aiohttp as an HTTP client library (ie `aiohttp.ClientSession`). Sending a crafted HTTP request will cause the server to misinterpret one of the HTTP header values leading to HTTP request smuggling. This issue has been addressed in version 3.8.5. Users are advised to upgrade. Users unable to upgrade can reinstall aiohttp using `AIOHTTP_NO_EXTENSIONS=1` as an environment variable to disable the llhttp HTTP request parser implementation. The pure Python implementation isn't vulnerable.

Reference:

https://github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w

Comment 2 errata-xmlrpc 2024-04-18 01:51:41 UTC
This issue has been addressed in the following products:

  RHUI 4 for RHEL 8

Via RHSA-2024:1878 https://access.redhat.com/errata/RHSA-2024:1878

Comment 3 errata-xmlrpc 2024-04-23 17:11:49 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.15 for RHEL 8

Via RHSA-2024:2010 https://access.redhat.com/errata/RHSA-2024:2010


Note You need to log in before you can comment on or make changes to this bug.