Open Redirect Affecting satellite package, versions <0:6.10.0-3.el7sat


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.55% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-SATELLITE-4512232
  • published26 Mar 2023
  • disclosed25 Feb 2021

Introduced: 25 Feb 2021

CVE-2021-21330  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade RHEL:7 satellite to version 0:6.10.0-3.el7sat or higher.
This issue was patched in RHSA-2021:4702.

NVD Description

Note: Versions mentioned in the description apply only to the upstream satellite package and not the satellite package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the aiohttp.web_middlewares.normalize_path_middleware middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using aiohttp.web_middlewares.normalize_path_middleware in your applications.

CVSS Base Scores

version 3.1