CVE-2021-21330

Sep 3, 2024

Published Date: 2021-02-26T03:15Z
Last Modified: 2023-11-22T17:09Z

CVSS Score: 6.1 (MEDIUM)

EPSS Score: 1.03%

Risk Score: 4.27 (MEDIUM)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 6.1  |  EPSS: 1.03%

Description: aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows “pip install aiohttp >= 3.7.4”. If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

Mitre ATT&CK Technical v15.1

T1583.004 – Server
T1059.006 – Python
T1584.004 – Server
T1053.002 – At

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

aiohttp - aiohttp, debian_linux - debian, fedora - fedoraproject, fedora - fedoraproject

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.