UNIX Symbolic Link (Symlink) Following
CVE-2024-42367
Summary
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Static routes that contain files with compressed variants (".gz" or ".br" extension) are vulnerable to path traversal outside the root directory if those variants are symbolic links. The server protects static routes from path traversal outside the root directory when "follow_symlinks=False" (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the "FileResponse" class, and symbolic links are then automatically followed when performing the "Path.stat()" and "Path.open()" to send the file. This vulnerability affects versions prior to 3.10.2.
- HIGH
- NETWORK
- LOW
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-61 - UNIX Symbolic Link (Symlink) Following
The software, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.
References
Advisory Timeline
- Published