The Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions.
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
Patch: https://github.com/aio-libs/aiohttp/commit/259edc369075de63e6f3a4eaade058c62af0df71
{
"cwe_ids": [
"CWE-444"
],
"github_reviewed": true,
"nvd_published_at": "2024-11-18T21:15:06Z",
"github_reviewed_at": "2024-11-18T21:02:32Z",
"severity": "MODERATE"
}