-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from missing validation in the HTTP method parameter handling. The patch adds a regex check (_CONTAINS_CONTROL_CHAR_RE) in ClientRequest's init method to prevent control characters. The pre-patch version of this function in client_reqrep.py accepted arbitrary method values without validation, making it the entry point for CRLF injection. The PoC demonstrates exploitation through session.request() with a malicious method parameter, which ultimately flows through this constructor.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| aiohttp | pip | < 3.9.0 | 3.9.0 |
KEV Misses 88% of Exploited CVEs- Get the report