aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-4041-1 | python-aiohttp security update |
![]() |
DSA-5828-1 | python-aiohttp security update |
![]() |
EUVD-2023-0006 | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0. |
![]() |
GHSA-q3qx-c6g2-7pw2 | aiohttp's ClientSession is vulnerable to CRLF injection via version |
![]() |
USN-7642-1 | AIOHTTP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T21:46:28.933Z
Reserved: 2023-11-21T18:57:30.428Z
Link: CVE-2023-49081

No data.

Status : Modified
Published: 2023-11-30T07:15:08.723
Modified: 2024-11-21T08:32:46.897
Link: CVE-2023-49081


No data.