astro@5.16.13 vulnerabilities

Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

  • latest version

    6.0.8

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the astro package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the /_server-islands/[name] route handler, which buffers and parses the entire request body as JSON without enforcing a size limit. An attacker can cause the server process to exhaust available memory and crash by sending a single unauthenticated request with a crafted payload containing many small JSON objects, resulting in significant memory amplification.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade astro to version 6.0.0-beta.20 or higher.

    <6.0.0-beta.20
    • M
    Server-side Request Forgery (SSRF)

    astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the inferSize option that fetches remote images at render time to determine their dimensions. An attacker can cause the server to make unauthorized requests to arbitrary remote hosts by supplying crafted image URLs.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade astro to version 5.17.3 or higher.

    <5.17.3
    • H
    Allocation of Resources Without Limits or Throttling

    astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in parseRequestBody(), when parsing Server Action requests. Attackers can trigger a crash by sending an excessively large POST request to an action endpoint, on a site with on-demand rendering. In the Node adapter (mode: 'standalone') an HTTP server with no body size protection is used, so the crashed process is automatically restarted, and repeated requests cause a persistent crash-restart loop.

    Note: Action names are discoverable from HTML form attributes on any public page.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade astro to version 5.17.3, 6.0.0-beta.15 or higher.

    >=5.0.0 <5.17.3>=6.0.0-alpha.0 <6.0.0-beta.15
    • H
    Server-side Request Forgery (SSRF)

    astro is an Astro is a modern site builder with web best practices, performance, and DX front-of-mind.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in renderError(), when custom prerendered error pages like 404.astro or 500.astro are in use. The resolved URL which is passed to a fetch() call allows redirects. As a result, attackers can access internal network resources and retrieve sensitive response bodies by manipulating the Host header to point to an attacker-controlled server.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade astro to version 5.17.3, 6.0.0-beta.7 or higher.

    <5.17.3>=6.0.0-alpha.0 <6.0.0-beta.7