Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue.

INFO

Published Date :

2024-11-18T20:12:48.612Z

Last Modified :

2025-11-03T20:45:25.646Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-52304 vulnerability.

Vendors Products
Aiohttp
  • Aiohttp
Python
  • Aiohttp
Redhat
  • Ansible Automation Platform
  • Satellite
  • Satellite Capsule

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact