Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-26112

Опубликовано: 03 апр. 2023
Источник: debian
EPSS Низкий

Описание

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
configobjfixed5.0.8-2package

Примечания

  • https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494

  • https://github.com/DiffSK/configobj/issues/232

  • https://github.com/DiffSK/configobj/pull/236

  • Negligible security impact

EPSS

Процентиль: 20%
0.00064
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 5.9
redhat
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 3.7
nvd
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

suse-cvrf
почти 2 года назад

Security update for python-configobj

suse-cvrf
почти 2 года назад

Security update for python-configobj

EPSS

Процентиль: 20%
0.00064
Низкий