CVE-2023-30798

NameCVE-2023-30798
DescriptionThere MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
starlette (PTS)bullseye0.14.1-1vulnerable
bookworm0.26.1-1fixed
sid, trixie0.41.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
starlettesource(unstable)0.25.0-1

Notes

[bullseye] - starlette <no-dsa> (Minor issue)
https://github.com/encode/starlette/commit/8c74c2c8dba7030154f8af18e016136bea1938fa (0.25.0)
https://github.com/encode/starlette/security/advisories/GHSA-74m5-2c7w-9w3x

Search for package or bug name: Reporting problems