Skip to content

Improper validation in meraki

High severity GitHub Reviewed Published Dec 12, 2023 in meraki/dashboard-api-python • Updated Jan 24, 2024

Package

pip meraki (pip)

Affected versions

< 1.40.1

Patched versions

1.40.1

Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.

meraki from version 1.40.1 requires aiohttp 3.9.0

References

Published to the GitHub Advisory Database Dec 13, 2023
Reviewed Dec 13, 2023
Last updated Jan 24, 2024

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-6x4h-9622-fqr6

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.