QID 150817

Date Published: 2024-02-29

QID 150817: aiohttp Directory Traversal Vulnerability (CVE-2024-23334)

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.

In affected versions of aiohttp, When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present.

Affected Versions:
aiohttp from version 1.0.5 up to 3.9.2

QID Detection Logic (Unauthenticated):
This QID sends an HTTP GET request to "/static" endpoint with Directory traversal payload to access "/etc/passwd" file and based on the response determines if the target application is vulnerable.

Successful exploitation of this vulnerability could allow an attacker to read arbitrary files on the target system.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution
    Customers are advised to upgrade aiohttp to version 3.9.2 or later to remediate this vulnerability. For more information please refer aiohttp Security Advisory.
    Vendor References

    CVEs related to QID 150817

    Software Advisories
    Advisory ID Software Component Link
    aiohttp Security Advisory URL Logo github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f