CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-52304

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00121/1

CVE-2024-52304 affects aiohttp, a Python HTTP client/server framework. This vulnerability involves incorrect parsing of newlines in chunk extensions by the Python parser, potentially leading to request smuggling. If aiohttp is installed without C extensions or with AIOHTTP_NO_EXTENSIONS enabled, attackers could bypass firewalls or proxy protections. The fix is available in version 3.10.11. While the CVSS score is 0, SOCRadar's Vulnerability Risk Score (SVRS) is 30, indicating a low risk, but the "In The Wild" tag suggests potential active exploitation. This vulnerability is significant because successful exploitation can compromise backend systems via request manipulation.

In The Wild
2024-11-18

2024-11-19

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-52304 | aio-libs aiohttp up to 3.10.10 request smuggling (Nessus ID 211948)
vuldb.com2024-11-28
CVE-2024-52304 | aio-libs aiohttp up to 3.10.10 request smuggling (Nessus ID 211948) | A vulnerability classified as problematic has been found in aio-libs aiohttp up to 3.10.10. Affected is an unknown function. The manipulation leads to http request smuggling. This vulnerability is traded as CVE-2024-52304. It is possible to launch the attack remotely. There is no exploit available. It is recommended to upgrade the affected component
vuldb.com
rss
forum
news

Social Media

CVE-2024-52304 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorr… https://t.co/iLcU5hzC66
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/aio-libs/aiohttp/commit/259edc369075de63e6f3a4eaade058c62af0df71
[email protected]https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8495-4g3g-x7pr

CWE Details

CWE IDCWE NameDescription
CWE-444Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to smuggle a request to one device without the other device being aware of it.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence