Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fg9-p83m-x5pq

Опубликовано: 27 сент. 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.2
CVSS3: 5.9

Описание

ReDoS issue in dparse

Impact

dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service).

All users parsing index server URLs with dparse are impacted by this vulnerability.

Patches

The Patch is applied in the 0.5.2 version, all users are recommended to upgrade as soon as possible.

Workarounds

Avoid passing index server URLs in the source file to be parsed.

References

https://github.com/pyupio/dparse/tree/security/remove-intensive-regex

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

dparse

pip
Затронутые версииВерсия исправления

< 0.5.2

0.5.2

EPSS

Процентиль: 74%
0.00802
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-1333
CWE-400

Связанные уязвимости

CVSS3: 5.9
nvd
больше 3 лет назад

dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version `0.5.2`, all the users are advised to upgrade to `0.5.2` as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.

EPSS

Процентиль: 74%
0.00802
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-1333
CWE-400