<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-011391</VulinfoID>
    <VulinfoData>
      <Title>AIOHTTP&#12395;&#12362;&#12369;&#12427;&#35079;&#25968;&#12398;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>AIOHTTP&#12399;&#12289;asyncio&#12362;&#12424;&#12403;Python&#29992;&#12398;&#38750;&#21516;&#26399;HTTP&#12463;&#12521;&#12452;&#12450;&#12531;&#12488;/&#12469;&#12540;&#12496;&#12540;&#12501;&#12524;&#12540;&#12512;&#12527;&#12540;&#12463;&#12391;&#12377;&#12290;&#12496;&#12540;&#12472;&#12519;&#12531;3.13.4&#20197;&#21069;&#12398;Windows&#29256;&#12391;&#12399;&#12289;&#38745;&#30340;&#12522;&#12477;&#12540;&#12473;&#12495;&#12531;&#12489;&#12521;&#12540;&#12364;NTLMv2&#12398;&#12522;&#12514;&#12540;&#12488;&#12497;&#12473;&#12395;&#38306;&#12377;&#12427;&#24773;&#22577;&#12434;&#38706;&#20986;&#12377;&#12427;&#21487;&#33021;&#24615;&#12364;&#12354;&#12426;&#12414;&#12375;&#12383;&#12290;&#12371;&#12398;&#21839;&#38988;&#12399;&#12496;&#12540;&#12472;&#12519;&#12531;3.13.4&#12391;&#20462;&#27491;&#12373;&#12428;&#12414;&#12375;&#12383;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:aiohttp:aiohttp</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-011391.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2026-34515</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2026-34515</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2026-34515</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2026-34515</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>GitHub</Name>
          <VulinfoID>UNC SSRF/NTLMv2 Credential Theft/Local File Read in static resource handler on Windows  Advisory  aio-libs/aiohttp  GitHub</VulinfoID>
          <URL>https://github.com/aio-libs/aiohttp/security/advisories/GHSA-p998-jp59-783m</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-918</VulinfoID>
          <Title>&#12469;&#12540;&#12496;&#12469;&#12452;&#12489;&#12398;&#12522;&#12463;&#12456;&#12473;&#12488;&#12501;&#12457;&#12540;&#12472;&#12455;&#12522;</Title>
          <URL>https://cwe.mitre.org/data/definitions/918.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-36</VulinfoID>
          <Title>&#32118;&#23550;&#12497;&#12473;&#12488;&#12521;&#12496;&#12540;&#12469;&#12523;</Title>
          <URL>https://cwe.mitre.org/data/definitions/36.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>Release 3.13.4  aio-libs/aiohttp  GitHub</VulinfoID>
          <URL>https://github.com/aio-libs/aiohttp/releases/tag/v3.13.4</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>[PR #12125/f049588a backport][3.13] Block absolute paths in static fi&#8230;  aio-libs/aiohttp@0ae2aa0  GitHub</VulinfoID>
          <URL>https://github.com/aio-libs/aiohttp/commit/0ae2aa076c84573df83fc1fdc39eec0f5862fe3d</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-04-17T11:03:33+09:00</DateFirstPublished>
      <DateLastUpdated>2026-04-17T11:03:33+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
