CVE-2024-32982

Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, 2.7.2, and 2.6.4, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in versions 2.8.3, 2.7.2, and 2.6.4.
Configurations

No configuration.

History

21 Nov 2024, 09:16

Type Values Removed Values Added
Summary
  • (es) Litestar y Starlite es un framework de interfaz de puerta de enlace de servidor asíncrono (ASGI). Antes de las versiones 2.8.3, 2.7.2 y 2.6.4, se descubrió una vulnerabilidad de inclusión de archivos locales (LFI) en el componente de servicio de archivos estáticos de LiteStar. Esta vulnerabilidad permite a los atacantes explotar fallas de path traversal, permitiendo el acceso no autorizado a archivos confidenciales fuera de los directorios designados. Dicho acceso puede dar lugar a la divulgación de información confidencial o potencialmente comprometer el servidor. La vulnerabilidad se encuentra en el mecanismo de manejo de rutas de archivos dentro de la función de servicio de contenido estático, específicamente en `litestar/static_files/base.py`. Esta vulnerabilidad se solucionó en las versiones 2.8.3, 2.7.2 y 2.6.4.
References () https://github.com/litestar-org/litestar/blob/main/litestar/static_files/base.py#L70 - () https://github.com/litestar-org/litestar/blob/main/litestar/static_files/base.py#L70 -
References () https://github.com/litestar-org/litestar/commit/57e706e7effdc182fc9a2af5981bc88afb21851b - () https://github.com/litestar-org/litestar/commit/57e706e7effdc182fc9a2af5981bc88afb21851b -
References () https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf - () https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf -

06 May 2024, 21:15

Type Values Removed Values Added
Summary (en) Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in 2.8.3. (en) Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, 2.7.2, and 2.6.4, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in versions 2.8.3, 2.7.2, and 2.6.4.

06 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-06 15:15

Updated : 2024-11-21 09:16


NVD link : CVE-2024-32982

Mitre link : CVE-2024-32982

CVE.ORG link : CVE-2024-32982


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')