
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-49081 affects aiohttp, an asynchronous HTTP client/server framework for asyncio and Python. The vulnerability was discovered and disclosed on November 30, 2023. The issue allows an attacker to modify HTTP requests or create new requests by exploiting improper validation of HTTP version parameters. This vulnerability affects versions prior to 3.9.0 (GitHub Advisory).
The vulnerability stems from improper validation of HTTP version parameters in the ClientSession component. The issue occurs specifically when an attacker can control the HTTP version of the request and the Connection header is passed to the headers parameter. When a list is passed as the version parameter, it bypasses validation, enabling CRLF injection. The vulnerability has been assigned a CVSS v3.1 base score of 7.2 (HIGH) by GitHub and 5.3 (MEDIUM) by NVD (NVD).
When successfully exploited, this vulnerability can lead to HTTP request smuggling, allowing attackers to modify existing HTTP requests (such as inserting new headers) or create entirely new HTTP requests. This could potentially lead to security implications in applications relying on aiohttp for HTTP communications (GitHub Advisory).
The vulnerability has been patched in aiohttp version 3.9.0. For users unable to upgrade immediately, a workaround is available: validate user input to the version parameter to ensure it is a string type. The fix involves disallowing arbitrary sequence types in the version parameter (GitHub Fix).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."