PyPi: Starlite

CVE-2024-32982

Safety vulnerability ID: 70851

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 06, 2024 Updated at May 07, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of Starlite are vulnerable to Path Traversal. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server.

Affected package

starlite

Latest version: 1.51.16

Performant, light and flexible ASGI API Framework

Affected versions

Fixed versions

Vulnerability changelog

:warning: **Important** :warning:

This release contains a patch for a [vulnerability](https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf) that would allow path traversal in the static file serving functionality of Litestar. It is highly recommended to update your minor version to this patch release.

You can find more background information in the related discussion 3473 .

Sponsors 🌟
Thanks to these incredible business sponsors:

[Scalar](https://scalar.com/) (scalar), [Telemetry Sports](https://telemetrysports.com/) (via chris-telemetry), [Stok](https://www.stok.kr/) (stok-team)

A huge 'Thank you!' to all other sponsors across [Polar.sh](https://polar.sh/litestar-org), [OpenCollective](https://opencollective.com/litestar) and [GitHub Sponsors](https://github.com/sponsors/litestar-org/)!

What's changed

* Fix improper Limitation of a Pathname to a Restricted Directory by peterschutt in https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application