中危 aiohttp 的 HTTP 解析器(Python 解析器,不是 llhttp)对于分隔符仍然过于宽松 (CVE-2024-23829)

CVE编号

CVE-2024-23829

利用情况

暂无

补丁情况

官方补丁

披露时间

2024-01-30
漏洞描述
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 aiohttp aiohttp * Up to
(excluding)
3.9.2
运行在以下环境
系统 fedoraproject fedora 39 -
运行在以下环境
系统 fedora_38 python-aiohttp * Up to
(excluding)
3.9.3-1.fc38
运行在以下环境
系统 fedora_39 python-aiohttp * Up to
(excluding)
3.9.3-1.fc39
运行在以下环境
系统 fedora_EPEL_9 python-aiohttp * Up to
(excluding)
3.9.3-1.el9
阿里云评分
6.1
  • 攻击路径
    本地
  • 攻击复杂度
    困难
  • 权限要求
    普通权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-444 HTTP请求的解释不一致性(HTTP请求私运)
阿里云安全产品覆盖情况