starlite@1.3.3 vulnerabilities

Performant, light and flexible ASGI API Framework

Direct Vulnerabilities

Known vulnerabilities in the starlite package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

starlite is a Light-weight and flexible ASGI API Framework

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when the multipart body parser processes an unlimited number of file parts and an unlimited number of field parts. Exploiting this vulnerability is possible by sending many concurrent multipart requests in a loop, and might result in blocking all available worker processes and significantly delay or slow down the processing of legitimate user requests.

Note: This vulnerability affects applications with a request handler that accepts a Body(media_type=RequestEncodingType.MULTI_PART).

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade starlite to version 1.51.2 or higher.

[,1.51.2)
  • M
Cross-site Request Forgery (CSRF)

starlite is a Light-weight and flexible ASGI API Framework

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to missing csrf_token in templates.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade starlite to version 1.28.0 or higher.

[,1.28.0)