CVE-2024-23334

Source
https://cve.org/CVERecord?id=CVE-2024-23334
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23334.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-23334
Aliases
Downstream
Related
Published
2024-01-29T22:41:39.584Z
Modified
2026-04-16T04:12:29.115851Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
aiohttp.web.static(follow_symlinks=True) is vulnerable to directory traversal
Details

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'followsymlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'followsymlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/23xxx/CVE-2024-23334.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/aio-libs/aiohttp

Affected ranges

Type
GIT
Repo
https://github.com/aio-libs/aiohttp
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23334.json"