漏洞信息详情
aiohttp 输入验证错误漏洞
漏洞简介
aiohttp是一个开源的用于 asyncio 和 Python 的异步 HTTP 客户端/服务器框架。
aiohttp before version 3.7.4 存在输入验证错误漏洞,该漏洞源于一个开放的重定向漏洞。恶意制作的指向会将浏览器重定向到另一个网站。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg
参考网址
来源:http
链接:http/
来源:MISC
链接:https://pypi.org/project/aio
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/
来源:http
链接:http/security/advisories/GHSA-v6wp-4m6f-gcjg
来源:CONFIRM
链接:https://github.com/aio-libs/aio
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4864
来源:http
链接:http/blob/master/CHANGES.rst#374-2021-02-25
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/
来源:http
链接:http/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3919
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021100409
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1415
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6492213
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-21330
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0733
来源:http-open-redirect-34708
链接:http-open-redirect-34708
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Python-aio
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164991/Red-Hat-Security-Advisory-2021-4702-01.html
受影响实体
暂无
补丁
- aiohttp 输入验证错误漏洞的修复措施<!--2021-2-25-->
还没有评论,来说两句吧...