Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-53232.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-53232
Upstream
Published
2024-11-18T21:15:06Z
Modified
2026-04-01T05:17:59.409728Z
Summary
CVE-2024-52304 affecting package python-aiohttp 3.6.2-3
Details

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

References

Affected packages

Azure Linux:2 / python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:rpm/azure-linux/python-aiohttp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.6.2-3

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-53232.json"