Thanks to visit codestin.com
Credit goes to github.com

Skip to content

fastapi-0.88.0-pyhd8ed1ab_0.conda: 1 vulnerabilities (highest severity is: 7.5) #63

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - fastapi-0.88.0-pyhd8ed1ab_0.conda

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/anaconda3/pkgs/starlette-0.22.0-pyhd8ed1ab_0.tar.bz2

Found in HEAD commit: fd25f8b654a14d4f2bf79da5b0c001061f2ab6c1

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (fastapi version) Remediation Available
WS-2023-0037 High 7.5 starlette-0.22.0-pyhd8ed1ab_0.tar.bz2 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.

Details

WS-2023-0037

Vulnerable Library - starlette-0.22.0-pyhd8ed1ab_0.tar.bz2

The little ASGI framework that shines.

Library home page: https://api.anaconda.org/download/conda-forge/starlette/0.22.0/noarch/starlette-0.22.0-pyhd8ed1ab_0.tar.bz2

Path to dependency file: /environment.yml

Path to vulnerable library: /home/wss-scanner/anaconda3/pkgs/starlette-0.22.0-pyhd8ed1ab_0.tar.bz2

Dependency Hierarchy:

  • fastapi-0.88.0-pyhd8ed1ab_0.conda (Root Library)
    • starlette-0.22.0-pyhd8ed1ab_0.tar.bz2 (Vulnerable Library)

Found in HEAD commit: fd25f8b654a14d4f2bf79da5b0c001061f2ab6c1

Found in base branch: develop

Vulnerability Details

A Denial of Service (DoS) vulnerability was discovered in starlette prior to 0.25.0. The MultipartParser using the package python-multipart accepts an unlimited number of multipart parts (form fields or files). Processing too many parts results in high CPU usage and high memory usage, eventually leading to an OOM process kill. This can be triggered by sending too many small form fields with no content, or too many empty files.

Publish Date: 2023-02-14

URL: WS-2023-0037

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-74m5-2c7w-9w3x

Release Date: 2023-02-14

Fix Resolution: starlette - 0.25.0

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions