k-NN icon indicating copy to clipboard operation
k-NN copied to clipboard

CVE-2024-30251 (High) detected in aiohttp-3.8.6-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

Open mend-for-github-com[bot] opened this issue 1 year ago • 3 comments

CVE-2024-30251 - High Severity Vulnerability

Vulnerable Library - aiohttp-3.8.6-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

Async http client/server framework (asyncio)

Library home page: https://files.pythonhosted.org/packages/a5/e7/af237a28203958d885f7f57731cb4f9c510597a35c593c5c20224dd72072/aiohttp-3.8.6-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl

Path to dependency file: /benchmarks/osb/requirements.txt

Path to vulnerable library: /benchmarks/osb/requirements.txt

Dependency Hierarchy:

  • :x: aiohttp-3.8.6-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (Vulnerable Library)

Found in base branch: main

Vulnerability Details

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In affected versions an attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests. An attacker can stop the application from serving requests after sending a single request. This issue has been addressed in version 3.9.4. Users are advised to upgrade. Users unable to upgrade may manually apply a patch to their systems. Please see the linked GHSA for instructions. Mend Note: The vulnerability was fixed in version 3.9.4 (unaffected). A few minor follow-up patches were added in 3.9.5, as stated in https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5m98-qgg9-wh84.

Publish Date: 2024-05-02

URL: CVE-2024-30251

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5m98-qgg9-wh84

Release Date: 2024-05-02

Fix Resolution: 3.9.4


  • [ ] Check this box to open an automated fix PR

I dont understand. I already remedied the issue and its clearly set to 3.9.4 in main: https://github.com/opensearch-project/k-NN/blob/main/benchmarks/osb/requirements.txt#L7. We'll see what automatic remediation they are going to try to attempt

jmazanec15 avatar May 03 '24 15:05 jmazanec15

@jmazanec15 Shouldn't we need to upgrade the dependency in 2.x branch as well?

heemin32 avatar May 23 '24 16:05 heemin32

In the description it says "Found in base branch: main" which is what is confusing me

jmazanec15 avatar May 23 '24 16:05 jmazanec15

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.