Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fj7x-q9j7-g6q6

Опубликовано: 19 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Black vulnerable to Regular Expression Denial of Service (ReDoS)

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.

Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

Пакеты

Наименование

black

pip
Затронутые версииВерсия исправления

< 24.3.0

24.3.0

EPSS

Процентиль: 19%
0.0006
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-1333
CWE-75

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

CVSS3: 5.3
redhat
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

CVSS3: 5.3
nvd
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

CVSS3: 5.3
debian
почти 2 года назад

Versions of the package black before 24.3.0 are vulnerable to Regular ...

suse-cvrf
больше 1 года назад

Security update for python-black

EPSS

Процентиль: 19%
0.0006
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-1333
CWE-75