aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aio-libs Project
Aio-libs Project aiohttp |
|
CPEs | cpe:2.3:a:aio-libs_project:aiohttp:-:*:*:*:*:*:*:* | |
Vendors & Products |
Aio-libs Project
Aio-libs Project aiohttp |
|
Metrics |
ssvc
|
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhui
|
|
CPEs | cpe:/a:redhat:rhui:4::el8 | |
Vendors & Products |
Redhat rhui
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:47:46.349Z
Reserved: 2024-03-26T12:52:00.933Z
Link: CVE-2024-30251

Updated: 2024-08-02T01:32:05.424Z

Status : Awaiting Analysis
Published: 2024-05-02T14:15:09.627
Modified: 2024-11-21T09:11:32.630
Link: CVE-2024-30251
