Skip to content

Conversation

@ColeMurray
Copy link

@ColeMurray ColeMurray commented Nov 1, 2025

Summary

  • Updates Starlette from 0.48.0 to 0.50.0 to address a critical security vulnerability
  • Fixes CVE where an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic
  • This vulnerability enables CPU exhaustion and denial-of-service attacks on file-serving endpoints

Details

Prior to 0.49.1, Starlette was vulnerable to a DoS attack through crafted HTTP Range headers. This patch upgrades to version 0.50.0 which includes the security fix from 0.49.1.

Changes

  • Updated uv.lock to reference Starlette 0.50.0

Updates Starlette from 0.48.0 to 0.50.0 to address a critical security
vulnerability where an unauthenticated attacker can send a crafted HTTP
Range header that triggers quadratic-time processing in Starlette's
FileResponse Range parsing/merging logic, enabling CPU exhaustion and
denial-of-service attacks on file-serving endpoints.

Fixed in Starlette 0.50.0.
@eyurtsev
Copy link
Collaborator

eyurtsev commented Nov 3, 2025

@ColeMurray this is a uv.lock file. Could you retitle the PR or description appropriately? since this change actually doesn't affect anything that's end user facing (i.e., the lock file is only used when running unit tests on CI for this library -- it's not something that affects any users of the library)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants