Логотип exploitDog
bind:CVE-2024-32982
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-32982

Количество 2

Количество 2

nvd логотип

CVE-2024-32982

почти 2 года назад

Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, 2.7.2, and 2.6.4, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in versions 2.8.3, 2.7.2, and 2.6.4.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-83pv-qr33-2vcf

почти 2 года назад

Litestar and Starlite vulnerable to Path Traversal

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-32982

Litestar and Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.8.3, 2.7.2, and 2.6.4, a Local File Inclusion (LFI) vulnerability has been discovered in the static file serving component of LiteStar. This vulnerability allows attackers to exploit path traversal flaws, enabling unauthorized access to sensitive files outside the designated directories. Such access can lead to the disclosure of sensitive information or potentially compromise the server. The vulnerability is located in the file path handling mechanism within the static content serving function, specifically at `litestar/static_files/base.py`. This vulnerability is fixed in versions 2.8.3, 2.7.2, and 2.6.4.

CVSS3: 8.2
0%
Низкий
почти 2 года назад
github логотип
GHSA-83pv-qr33-2vcf

Litestar and Starlite vulnerable to Path Traversal

CVSS3: 8.2
0%
Низкий
почти 2 года назад

Уязвимостей на страницу