Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. aiohttp
  4. ›
  5. CVE-2023-49082

CVE-2023-49082: aiohttp's ClientSession is vulnerable to CRLF injection via method

November 27, 2023

Summary

Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method.

Details

The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request.

Previous releases performed no validation on the provided value. If an attacker controls the HTTP method it will be used as is and can lead to HTTP request smuggling.

PoC

A minimal example can be found here: https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b

Impact

If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling).

Workaround

If unable to upgrade and using user-provided values for the request method, perform manual validation of the user value (e.g. by restricting it to a few known values like GET, POST etc.).

References

  • gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b
  • github.com/advisories/GHSA-qvrw-v9rv-5rjx
  • github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx

Code Behaviors & Features

Detect and mitigate CVE-2023-49082 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.9.0

Fixed versions

  • 3.9.0

Solution

Upgrade to version 3.9.0 or above.

Source file

pypi/aiohttp/CVE-2023-49082.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.