starlite@1.51.0 vulnerabilities

Performant, light and flexible ASGI API Framework

Direct Vulnerabilities

Known vulnerabilities in the starlite package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Path Traversal

starlite is a Light-weight and flexible ASGI API Framework

Affected versions of this package are vulnerable to Path Traversal through the static content serving function. An attacker can gain unauthorized access to sensitive files outside the designated directories by exploiting path traversal flaws in the file path handling mechanism.

Notes:

  1. From versions 0.X.X through 1.X.X, the package was released under the name "starlite."

  2. Starting with version 2.0.0 and for all subsequent versions, the package has been rebranded and released under the name "litestar."

How to fix Path Traversal?

Upgrade starlite to version 1.51.16 or higher.

[1.37.0,1.51.16)
  • H
Allocation of Resources Without Limits or Throttling

starlite is a Light-weight and flexible ASGI API Framework

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when the multipart body parser processes an unlimited number of file parts and an unlimited number of field parts. Exploiting this vulnerability is possible by sending many concurrent multipart requests in a loop, and might result in blocking all available worker processes and significantly delay or slow down the processing of legitimate user requests.

Note: This vulnerability affects applications with a request handler that accepts a Body(media_type=RequestEncodingType.MULTI_PART).

How to fix Allocation of Resources Without Limits or Throttling?

Upgrade starlite to version 1.51.2 or higher.

[,1.51.2)