CVE-2023-47627

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*

History

05 Feb 2024, 07:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUSJVQ7OQ55RWL4XAX2F5EZ73N4ZSH6U/ -

07 Dec 2023, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDKQ6HM3KNDU4OQI476ZWT4O7DMSIT35/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQYQL6WV535EEKSNH7KRARLLMOW5WXDM/ -
CWE CWE-444

22 Nov 2023, 22:40

Type Values Removed Values Added
CPE cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*
References () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg - () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg - Exploit, Vendor Advisory
References () https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d - () https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d - Patch
First Time Aiohttp
Aiohttp aiohttp
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

14 Nov 2023, 21:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 21:15

Updated : 2024-02-05 07:15


NVD link : CVE-2023-47627

Mitre link : CVE-2023-47627

CVE.ORG link : CVE-2023-47627


JSON object : View

Products Affected

aiohttp

  • aiohttp
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')