Release Date: | 2024-11-18 | |
Impact: | Low | What is this? |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.
See more information about CVE-2024-52304 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 0.0 |
Vector String: | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N |
Version: | 3.1 |
Attack Vector: | Network |
Attack Complexity: | Low |
Privileges Required: | None |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality Impact: | None |
Integrity Impact: | None |
Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Linux version 8 (ol-automation-manager) | OLAMSA-2025-0003 | 2025-04-14 |
Oracle Linux version 8 (python-aiohttp) | OLAMSA-2025-0003 | 2025-04-14 |
Oracle Linux version 8 (python-django) | OLAMSA-2025-0003 | 2025-04-14 |
Oracle Linux version 8 (python-jinja2) | OLAMSA-2025-0003 | 2025-04-14 |
Oracle Linux version 8 (python-requests) | OLAMSA-2025-0003 | 2025-04-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: