Inconsistent Interpretation of HTTP Messages Affecting aiohttp package, versions [,3.8.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-AIOHTTP-6057352
  • published15 Nov 2023
  • disclosed14 Nov 2023
  • creditchinchila

Introduced: 14 Nov 2023

CVE-2023-47641  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade aiohttp to version 3.8.0 or higher.

Overview

Affected versions of this package are vulnerable to Inconsistent Interpretation of HTTP Messages due to the inconsistent interpretation of Content-Length vs. Transfer-Encoding in both C and Python fallbacks. An attacker can bypass proxy rules and poison sockets to other users, potentially passing Authentication Headers.

Note:

This is only exploitable if a configuration with a reverse proxy that accepts both Content-Length and Transfer-Encoding headers and aiohttp as backend is present.

Additionally, if an Open Redirect is present, it can be combined to redirect random users to an attacker's website and log the request.

CVSS Scores

version 3.1