First published: Thu Sep 05 2024(Updated: )
It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-aiohttp-doc | <3.9.1-1ubuntu0.1 | 3.9.1-1ubuntu0.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/python3-aiohttp | <3.9.1-1ubuntu0.1 | 3.9.1-1ubuntu0.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/python-aiohttp-doc | <3.8.1-4ubuntu0.2 | 3.8.1-4ubuntu0.2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-aiohttp | <3.8.1-4ubuntu0.2 | 3.8.1-4ubuntu0.2 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-aiohttp | <3.6.2-1ubuntu1+esm3 | 3.6.2-1ubuntu1+esm3 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/python3-aiohttp | <3.0.1-1ubuntu0.1~esm4 | 3.0.1-1ubuntu0.1~esm4 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.