Safety vulnerability ID: 74380
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of aiohttp are vulnerable to Directory Traversal (CWE-22). This allows attackers to access sensitive files outside the intended directory by exploiting symbolic links with compressed file extensions. The vulnerability exists in the FileResponse class where stat() is used instead of lstat(), causing the server to follow symlinks when checking for compressed file variants. To mitigate, update aiohttp to include the fix or modify the code to use lstat() and ensure only regular files are served.
Latest version: 3.11.11
Async http client/server framework (asyncio)
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application