Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c33w-24p9-8m24

Опубликовано: 03 апр. 2023
Источник: github
Github: Прошло ревью
CVSS3: 3.7

Описание

configobj ReDoS exploitable by developer using values in a server-side configuration file

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)). Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

Пакеты

Наименование

configobj

pip
Затронутые версииВерсия исправления

< 5.0.9

5.0.9

EPSS

Процентиль: 20%
0.00064
Низкий

3.7 Low

CVSS3

Дефекты

CWE-1333

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 5.9
redhat
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 3.7
nvd
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 3.7
debian
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expres ...

suse-cvrf
почти 2 года назад

Security update for python-configobj

EPSS

Процентиль: 20%
0.00064
Низкий

3.7 Low

CVSS3

Дефекты

CWE-1333