Directory traversal vulnerability in Starlette versions 0.13.5 and later and prior to 0.27.0 allows a remote unauthenticated attacker to view files in a web service which was built using Starlette.
References
Link | Resource |
---|---|
https://github.com/encode/starlette/releases/tag/0.27.0 | Release Notes |
https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px | Exploit Vendor Advisory |
https://jvn.jp/en/jp/JVN95981715/ | Third Party Advisory |
Configurations
History
08 Jun 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/encode/starlette/releases/tag/0.27.0 - Release Notes | |
References | (MISC) https://jvn.jp/en/jp/JVN95981715/ - Third Party Advisory | |
References | (MISC) https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Encode
Encode starlette |
|
CWE | CWE-22 | |
CPE | cpe:2.3:a:encode:starlette:*:*:*:*:*:python:*:* |
01 Jun 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 02:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-29159
Mitre link : CVE-2023-29159
CVE.ORG link : CVE-2023-29159
JSON object : View
Products Affected
encode
- starlette
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')