CVE-2024-23334

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

09 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/ -

05 Feb 2024, 18:44

Type Values Removed Values Added
References () https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b - () https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b - Patch
References () https://github.com/aio-libs/aiohttp/pull/8079 - () https://github.com/aio-libs/aiohttp/pull/8079 - Patch
References () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f - () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f - Exploit, Mitigation, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ - Mailing List
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*
First Time Aiohttp aiohttp
Aiohttp
Fedoraproject
Fedoraproject fedora

05 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ -

30 Jan 2024, 14:18

Type Values Removed Values Added
Summary
  • (es) aiohttp es un framework cliente/servidor HTTP asíncrono para asyncio y Python. Cuando se utiliza aiohttp como servidor web y se configuran rutas estáticas, es necesario especificar la ruta raíz para los archivos estáticos. Además, la opción 'follow_symlinks' se puede utilizar para determinar si se deben seguir enlaces simbólicos fuera del directorio raíz estático. Cuando 'follow_symlinks' se establece en Verdadero, no hay validación para verificar si la lectura de un archivo está dentro del directorio raíz. Esto puede generar vulnerabilidades de directory traversal, lo que resulta en acceso no autorizado a archivos arbitrarios en el sistema, incluso cuando no hay enlaces simbólicos presentes. Se recomiendan como mitigaciones deshabilitar follow_symlinks y usar un proxy inverso. La versión 3.9.2 soluciona este problema.

29 Jan 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-29 23:15

Updated : 2024-02-09 03:15


NVD link : CVE-2024-23334

Mitre link : CVE-2024-23334

CVE.ORG link : CVE-2024-23334


JSON object : View

Products Affected

fedoraproject

  • fedora

aiohttp

  • aiohttp
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')