View all vulnerabilities

CVE-2021-21330

`aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware)

### ImpactOpen redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website.It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware.### PatchesThis security problem has been fixed in v3.7.4. Upgrade your dependency as follows:[`pip install aiohttp >= 3.7.4`]### WorkaroundsIf upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.### References* [aiohttp @ PyPI]* [GHSA-v6wp-4m6f-gcjg]* [OWASP page on open redirects]### For more informationIf you have any questions or comments about this advisory:* Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose)* Email us at wk+aio-libs-security@sydorenko.org.ua and/or andrew.svetlov+aio-libs-security@gmail.comCredit: [Jelmer Vernooij] and [Beast Glatisant].[aiohttp @ PyPI]: https://pypi.org/p/aiohttp[`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/[GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg[OWASP page on open redirects]:https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html[Jelmer Vernooij]: https://jelmer.uk[Beast Glatisant]: https://github.com/g147

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
3
Score Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Affected Versions
aiohttp < 3.7.4
Severity
Low
Ecosystem
Python
Publish Date
February 25, 2021
Modified Date
February 15, 2025