3 results (0.004 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

15 Oct 2024 — Starlette is an Asynchronous Server Gateway Interface (ASGI) framework/toolkit. Prior to version 0.40.0, Starlette treats `multipart/form-data` parts without a `filename` as text form fields and buffers those in byte strings with no size limit. This allows an attacker to upload arbitrary large form fields and cause Starlette to both slow down significantly due to excessive memory allocations and copy operations, and also consume more and more memory until the server starts swapping and grinds to a halt, or ... • https://github.com/encode/starlette/security/advisories/GHSA-f96h-pmfr-66vw • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

01 Jun 2023 — Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette. La vulnerabilidad de salto de directorios en Starlette v0.13.5 y posteriores y anteriores a 0.27.0 permite a un atacante remoto no autenticado ver archivos en un servicio web que fue creado usando Starlette. • https://github.com/encode/starlette/releases/tag/0.27.0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

21 Apr 2023 — There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service. • https://github.com/encode/starlette/commit/8c74c2c8dba7030154f8af18e016136bea1938fa • CWE-400: Uncontrolled Resource Consumption •