First published: Tue Feb 14 2023(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-74m5-2c7w-9w3x. This link is maintained to preserve external references. ## Original Description There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
Credit: disclosure@vulncheck.com disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Pak for Business Automation | <0.25.0 | |
pip/starlette | <0.25.0 | 0.25.0 |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF004 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF020 | |
IBM Cloud Pak for Business Automation | <=V22.0.1 - V22.0.1-IF006 and later fixesV21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes | |
Encode Starlette | <0.25.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30798 is a vulnerability in the MultipartParser of Encode Starlette, which allows an attacker to cause a denial of service by sending specially-crafted requests.
The severity of CVE-2023-30798 is high, with a CVSS score of 7.5.
CVE-2023-30798 affects the Encode Starlette framework in versions prior to 0.25.0.
An attacker can exploit CVE-2023-30798 by sending specially-crafted requests to the affected system.
Yes, the vulnerability in Encode Starlette can be fixed by upgrading to version 0.25.0 or later.