CVE-2023-49081: aiohttp's ClientSession is vulnerable to CRLF injection via version
(updated )
Improper validation make it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or even create a new HTTP request if the attacker controls the HTTP version.
References
- gist.github.com/jnovikov/184afb593d9c2114d77f508e0ccd508e
- github.com/advisories/GHSA-q3qx-c6g2-7pw2
- github.com/aio-libs/aiohttp
- github.com/aio-libs/aiohttp/commit/1e86b777e61cf4eefc7d92fa57fa19dcc676013b
- github.com/aio-libs/aiohttp/pull/7835/files
- github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
- github.com/pypa/advisory-database/tree/main/vulns/aiohttp/PYSEC-2023-250.yaml
- lists.debian.org/debian-lts-announce/2025/02/msg00002.html
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY5SI6NK5243DEEDQUFKQKW5GQNKQUMA
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSYWMP64ZFCTC3VO6RY6EC6VSSMV6I3A
- nvd.nist.gov/vuln/detail/CVE-2023-49081
Code Behaviors & Features
Detect and mitigate CVE-2023-49081 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →