7.5
HIGH CVSS 3.1
CVE-2024-23334
aiohttp.web.static(follow_symlinks=True) is vulnerable to directory traversal
Description

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.

INFO

Published Date :

Jan. 29, 2024, 11:15 p.m.

Last Modified :

Feb. 4, 2026, 8:16 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2024-23334 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fedoraproject fedora
1 Aiohttp aiohttp
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
CVSS 3.1 HIGH [email protected]
Solution
Update aiohttp to address a directory traversal vulnerability.
  • Upgrade python-aiohttp to a non-vulnerable version.
  • If upgrading is not possible, disable follow_symlinks.
Public PoC/Exploit Available at Github

CVE-2024-23334 has a 69 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-23334 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Customer support intelligence platform with AI-powered features: smart ticket scoring, churn prediction, progressive conversation flows, and human-in-the-loop AI oversight

Shell Python PLpgSQL TypeScript

Updated: 1 day, 21 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2026, 11:37 p.m. This repo has been linked 1 different CVEs too.

Customer support intelligence platform with AI-powered features: smart ticket scoring, churn prediction, progressive conversation flows, and human-in-the-loop AI oversight

Shell Python PLpgSQL TypeScript

Updated: 1 day, 22 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2026, 11:24 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 2 days, 9 hours ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2026, noon This repo has been linked 219 different CVEs too.

None

Dockerfile Python Mako Shell Makefile

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : Jan. 28, 2026, 2:18 p.m. This repo has been linked 4 different CVEs too.

None

Python

Updated: 2 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : Jan. 27, 2026, 10:11 p.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 2 weeks, 4 days ago
0 stars 0 fork 0 watcher
Born at : Jan. 27, 2026, 4:31 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 3 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : Jan. 23, 2026, 5:46 p.m. This repo has been linked 4 different CVEs too.

Reachability-focused vulnerability triage for Python projects. Turns noisy scanner output into actionable findings by checking for static usage evidence. Fail-closed by default, offline-first, with EPSS/KEV enrichment, VEX export support and LLM enabled advisory.

ai python ruff security tools trivy uv

Python Shell

Updated: 1 week, 6 days ago
0 stars 0 fork 0 watcher
Born at : Dec. 24, 2025, 12:34 a.m. This repo has been linked 3 different CVEs too.

None

Dockerfile Python HTML

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Nov. 18, 2025, 6:08 p.m. This repo has been linked 1 different CVEs too.

None

Python Shell

Updated: 3 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Sept. 28, 2025, 7:54 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 5 months ago
0 stars 0 fork 0 watcher
Born at : Sept. 14, 2025, 10:52 a.m. This repo has been linked 1 different CVEs too.

None

Shell JavaScript Dockerfile Python Mako PLpgSQL HCL HTML TypeScript CSS

Updated: 3 weeks, 6 days ago
1 stars 0 fork 0 watcher
Born at : Sept. 11, 2025, 8:40 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile HTML SCSS TypeScript JavaScript

Updated: 3 weeks, 4 days ago
0 stars 0 fork 0 watcher
Born at : Sept. 1, 2025, 12:58 p.m. This repo has been linked 1 different CVEs too.

护网2024-POC收录备份

Updated: 6 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Aug. 4, 2025, 1:25 p.m. This repo has been linked 119 different CVEs too.

备份的漏洞库,3月开始我们来维护

Updated: 7 months ago
2 stars 0 fork 0 watcher
Born at : June 30, 2025, 9:14 a.m. This repo has been linked 216 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-23334 vulnerability anywhere in the article.

  • Daily CyberSecurity
The Invisible Landlord: ShadowSyndicate Rotates Keys to Hide Infrastructure

Group-IB Graph analysis of the network infrastructure related to ALPHVBlackCat | Image: Group-IB The sprawling, murky network known as ShadowSyndicate has evolved. Previously identified by a singular, ... Read more

Published Date: Feb 06, 2026 (1 week, 1 day ago)
  • Daily CyberSecurity
Aiohttp Patches Seven Vulnerabilities Including High-Severity DoS Risks

Maintainers of aiohttp, the popular asynchronous HTTP client/server framework for Python, have released a sweeping security update addressing seven distinct vulnerabilities. The update, version 3.13.3 ... Read more

Published Date: Jan 06, 2026 (1 month, 1 week ago)
  • Daily CyberSecurity
ShadowSyndicate’s Global Ransomware Empire Blurs Lines Between Cybercrime and Geopolitical Espionage

Attack infrastructure of ShadowSyndicate overlaps with Toneshell, Rustdoor and Koi stealer | Image: Intrinsec In a recent investigation, cybersecurity firm Intrinsec has illuminated the sprawling infr ... Read more

Published Date: Aug 04, 2025 (6 months, 1 week ago)
  • The Cyber Express
Cyble Sensors Uncover Cyberattacks Targeting Key Vulnerabilities

Cyble’s Vulnerability Intelligence unit has spotlighted a series of cyberattacks targeting critical vulnerabilities in various software systems, including the Ruby SAML library, D-Link NAS devices, an ... Read more

Published Date: Oct 14, 2024 (1 year, 4 months ago)

The following table lists the changes that have been made to the CVE-2024-23334 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Feb. 04, 2026

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/52474
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 03, 2025

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2025/02/msg00002.html
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b
    Added Reference https://github.com/aio-libs/aiohttp/pull/8079
    Added Reference https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Feb. 09, 2024

    Action Type Old Value New Value
    Added Reference GitHub, Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/ICUOCFGTB25WUT336BZ4UNYLSZOUVKBD/ [No types assigned]
  • Initial Analysis by [email protected]

    Feb. 05, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b No Types Assigned https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b Patch
    Changed Reference Type https://github.com/aio-libs/aiohttp/pull/8079 No Types Assigned https://github.com/aio-libs/aiohttp/pull/8079 Patch
    Changed Reference Type https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f No Types Assigned https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f Exploit, Mitigation, Vendor Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ Mailing List
    Added CPE Configuration OR *cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:* versions from (including) 1.0.5 up to (excluding) 3.9.2
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Feb. 05, 2024

    Action Type Old Value New Value
    Added Reference GitHub, Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/XXWVZIVAYWEBHNRIILZVB3R3SDQNNAA7/ [No types assigned]
  • CVE Received by [email protected]

    Jan. 29, 2024

    Action Type Old Value New Value
    Added Description aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
    Added Reference GitHub, Inc. https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f [No types assigned]
    Added Reference GitHub, Inc. https://github.com/aio-libs/aiohttp/pull/8079 [No types assigned]
    Added Reference GitHub, Inc. https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b [No types assigned]
    Added CWE GitHub, Inc. CWE-22
    Added CVSS V3.1 GitHub, Inc. AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

93.48 }} -0.10%

score

0.99817

percentile