CVE-2021-21330 – aiohttp
Package
Manager: pip
Name: aiohttp
Vulnerable Version: >=0 <3.7.4
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00486 pctl0.64421
Details
`aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware) ### Impact Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. ### Patches This security problem has been fixed in v3.7.4. Upgrade your dependency as follows: [`pip install aiohttp >= 3.7.4`] ### Workarounds If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. ### References * [aiohttp @ PyPI] * [GHSA-v6wp-4m6f-gcjg] * [OWASP page on open redirects] ### For more information If you have any questions or comments about this advisory: * Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose) * Email us at wk+aio-libs-security@sydorenko.org.ua and/or andrew.svetlov+aio-libs-security@gmail.com Credit: [Jelmer Vernooij] and [Beast Glatisant]. [aiohttp @ PyPI]: https://pypi.org/p/aiohttp [`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/ [GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg [OWASP page on open redirects]: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html [Jelmer Vernooij]: https://jelmer.uk [Beast Glatisant]: https://github.com/g147
Metadata
Created: 2021-02-26T02:11:57Z
Modified: 2024-09-03T21:02:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/02/GHSA-v6wp-4m6f-gcjg/GHSA-v6wp-4m6f-gcjg.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-v6wp-4m6f-gcjg
Finding: F156
Auto approve: 1