QID 150817
Date Published: 2024-02-29
QID 150817: aiohttp Directory Traversal Vulnerability (CVE-2024-23334)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.
In affected versions of aiohttp, When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present.
Affected Versions:
aiohttp from version 1.0.5 up to 3.9.2
QID Detection Logic (Unauthenticated):
This QID sends an HTTP GET request to "/static" endpoint with Directory traversal payload to access "/etc/passwd" file and based on the response determines if the target application is vulnerable.
Successful exploitation of this vulnerability could allow an attacker to read arbitrary files on the target system.
- aiohttp Security Advisory -
github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f
CVEs related to QID 150817
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| aiohttp Security Advisory |
|