CVE-2024-47874 – Starlette Denial of service (DoS) via multipart/form-data
https://notcve.org/view.php?id=CVE-2024-47874
Starlette is an Asynchronous Server Gateway Interface (ASGI) framework/toolkit. Prior to version 0.40.0, Starlette treats `multipart/form-data` parts without a `filename` as text form fields and buffers those in byte strings with no size limit. This allows an attacker to upload arbitrary large form fields and cause Starlette to both slow down significantly due to excessive memory allocations and copy operations, and also consume more and more memory until the server starts swapping and grinds to a halt, or the OS terminates the server process with an OOM error. Uploading multiple such requests in parallel may be enough to render a service practically unusable, even if reasonable request size limits are enforced by a reverse proxy in front of Starlette. This Denial of service (DoS) vulnerability affects all applications built with Starlette (or FastAPI) accepting form requests. • https://github.com/encode/starlette/security/advisories/GHSA-f96h-pmfr-66vw https://github.com/encode/starlette/commit/fd038f3070c302bff17ef7d173dbb0b007617733 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2023-29159
https://notcve.org/view.php?id=CVE-2023-29159
Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette. La vulnerabilidad de salto de directorios en Starlette v0.13.5 y posteriores y anteriores a 0.27.0 permite a un atacante remoto no autenticado ver archivos en un servicio web que fue creado usando Starlette. • https://github.com/encode/starlette/releases/tag/0.27.0 https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px https://jvn.jp/en/jp/JVN95981715 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2023-30798 – MultipartParser DOS with too many fields or files in Starlette Framework
https://notcve.org/view.php?id=CVE-2023-30798
There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service. • https://github.com/encode/starlette/commit/8c74c2c8dba7030154f8af18e016136bea1938fa https://github.com/encode/starlette/security/advisories/GHSA-74m5-2c7w-9w3x https://vulncheck.com/advisories/starlette-multipartparser-dos • CWE-400: Uncontrolled Resource Consumption •
CVE-2021-41945
https://notcve.org/view.php?id=CVE-2021-41945
Encode OSS httpx < 0.23.0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`. Encode OSS httpx anterior a la versión 0.23.0 se ve afectado por una validación de entrada inadecuada en `httpx.URL`, `httpx.Client` y algunas funciones que utilizan `httpx.URL.copy_with`. • http://encode.com https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 https://github.com/encode/httpx https://github.com/encode/httpx/discussions/1831 https://github.com/encode/httpx/issues/2184 https://github.com/encode/httpx/releases/tag/0.23.0 • CWE-20: Improper Input Validation •
CVE-2021-36770
https://notcve.org/view.php?id=CVE-2021-36770
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value. Encode.pm, distribuido en Perl versiones hasta 5.34.0, permite a usuarios locales alcanzar privilegios por medio de una biblioteca Encode::ConfigLocal (en el directorio de trabajo actual) que se adelanta a una carga dinámica de módulos. Una explotación requiere una configuración inusual, y determinadas versiones 2021 de Encode.pm (3.05 hasta 3.11). • https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9 https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NDGQSGMEZ75FJGBKNYC75OTO7TF7XHB https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6KOZYD7BH2DNIAEZ2ZL4PJ4QUVQI6Y33 https://metacpan.org/dist/Encode/changes https://news.cpanel.com/unscheduled-tsr-10-august-2021 https://security-tracker.debian.org/tracker • CWE-427: Uncontrolled Search Path Element •