跳转到帖子

Alpine Linux: CVE-2024-23829: HTTP Request/Response Smuggling

recommended_posts

发布于
  • Members

Alpine Linux: CVE-2024-23829: HTTP Request/Response Smuggling

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Published
01/29/2024
Created
08/23/2024
Added
08/22/2024
Modified
10/02/2024

Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input.Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.

Solution(s)

  • alpine-linux-upgrade-py3-aiohttp

References

  • https://attackerkb.com/topics/cve-2024-23829
  • CVE - 2024-23829
  • https://security.alpinelinux.org/vuln/CVE-2024-23829
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…