Skip to main content

UNIX Symbolic Link (Symlink) Following

CVE-2024-42367

Severity Medium
Score 4.8/10

Summary

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Static routes that contain files with compressed variants (".gz" or ".br" extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when "follow_symlinks=False" (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the "FileResponse" class, and symbolic links are then automatically followed when performing the "Path.stat()" and "Path.open()" to send the file. This vulnerability affects versions prior to 3.10.2.

  • HIGH
  • NETWORK
  • LOW
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-61 - UNIX Symbolic Link (Symlink) Following

The software, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.

Advisory Timeline

  • Published