CVE-2021-21330

LOW

Aiohttp < 3.7.4 - Open Redirect

Title source: rule
STIX 2.1

Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.

References (8)

Core 8
Core References
Product, Third Party Advisory x_refsource_misc
https://pypi.org/project/aiohttp/
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2021/dsa-4864
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202208-19

Scores

CVSS v3 3.1
EPSS 0.0049
EPSS Percentile 65.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Details

CWE
CWE-601
Status published
Products (5)
aiohttp/aiohttp < 3.7.4
debian/debian_linux 10.0
fedoraproject/fedora 33
fedoraproject/fedora 34
pypi/aiohttp 0 - 3.7.4PyPI
Published Feb 26, 2021
Tracked Since Feb 18, 2026