CVE-2024-23334

MEDIUM EXPLOITED IN THE WILD RANSOMWARE NUCLEI

aiohttp - Directory Traversal

Title source: nuclei

Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

Exploits (19)

exploitdb WORKING POC
by Beatriz Fresno Naumova · textwebappspython
https://www.exploit-db.com/exploits/52474
nomisec WORKING POC 27 stars
by jhonnybonny · infoleak
https://github.com/jhonnybonny/CVE-2024-23334
nomisec WORKING POC 20 stars
by z3rObyte · poc
https://github.com/z3rObyte/CVE-2024-23334-PoC
nomisec SUSPICIOUS 5 stars
by ox1111 · infoleak
https://github.com/ox1111/CVE-2024-23334
nomisec WORKING POC 4 stars
by wizarddos · infoleak
https://github.com/wizarddos/CVE-2024-23334
nomisec WORKING POC 4 stars
by s4botai · infoleak
https://github.com/s4botai/CVE-2024-23334-PoC
nomisec WORKING POC 4 stars
by sxyrxyy · poc
https://github.com/sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream
nomisec WORKING POC 2 stars
by TheRedP4nther · infoleak
https://github.com/TheRedP4nther/LFI-aiohttp-CVE-2024-23334-PoC
nomisec WORKING POC 1 stars
by Betan423 · infoleak
https://github.com/Betan423/CVE-2024-23334-PoC
nomisec WORKING POC 1 stars
by 0xR00 · poc
https://github.com/0xR00/CVE-2024-23334
nomisec WORKING POC 1 stars
by 0xR0t · poc
https://github.com/0xR0t/CVE-2024-23334
nomisec WORKING POC 1 stars
by Pylonet · remote
https://github.com/Pylonet/CVE-2024-23334
nomisec WORKING POC 1 stars
by Arc4he · infoleak
https://github.com/Arc4he/CVE-2024-23334-PoC
gitlab WORKING POC
by Eggzy · poc
https://gitlab.com/Eggzy/cve-2024-23334-poc-exploit
nomisec WORKING POC
by Sn0wBaall · poc
https://github.com/Sn0wBaall/CVE-2024-23334-PoC
nomisec WORKING POC
by BestDevOfc · infoleak
https://github.com/BestDevOfc/CVE-2024-23334-PoC
nomisec WORKING POC
by binaryninja · infoleak
https://github.com/binaryninja/CVE-2024-23334
nomisec WORKING POC
by brian-edgar-re · poc
https://github.com/brian-edgar-re/poc-cve-2024-23334

Nuclei Templates (1)

aiohttp - Directory Traversal
HIGHby DhiyaneshDk

Scores

CVSS v3 5.9
EPSS 0.9348
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-03-15
InTheWild.io 2024-03-17
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (3)
aiohttp/aiohttp 1.0.5 - 3.9.2
fedoraproject/fedora 39
pypi/aiohttp 1.0.5 - 3.9.2PyPI
Published Jan 29, 2024
Tracked Since Feb 18, 2026