### SummaryAn attacker can send a specially crafted POST (multipart/form-data) request. When the aiohttp server processes it, the server will enter an infinite loop and be unable to process any further requests.### ImpactAn attacker can stop the application from serving requests after sending a single request.-------For anyone needing to patch older versions of aiohttp, the minimum diff needed to resolve the issue is (located in `_read_chunk_from_length()`):```diffdiff --git a/aiohttp/multipart.py b/aiohttp/multipart.pyindex 227be605c..71fc2654a 100644--- a/aiohttp/multipart.py+++ b/aiohttp/multipart.py@@ -338,6 +338,8 @@ class BodyPartReader: assert self._length is not None, "Content-Length required for chunked read" chunk_size = min(size, self._length - self._read_bytes) chunk = await self._content.read(chunk_size)+ if self._content.at_eof():+ self._at_eof = True return chunk async def _read_chunk_from_stream(self, size: int) -> bytes:```This does however introduce some very minor issues with handling form data. So, if possible, it would be recommended to also backport the changes in:https://github.com/aio-libs/aiohttp/commit/cebe526b9c34dc3a3da9140409db63014bc4cf19https://github.com/aio-libs/aiohttp/commit/7eecdff163ccf029fbb1ddc9de4169d4aaeb6597https://github.com/aio-libs/aiohttp/commit/f21c6f2ca512a026ce7f0f6c6311f62d6a638866
Fix available through Seal Security. No upgrade required, protect your application instantly.
Fix without upgrading