Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vqhp-cxgc-6wmm

Опубликовано: 30 мар. 2020
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

regular expression denial-of-service (ReDoS) in Bleach

Impact

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS).

Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).

Patches

3.1.4

Workarounds

  • do not whitelist the style attribute in bleach.clean calls

  • limit input string length

References

Credits

  • Reported by schwag09 of r2c

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

bleach

pip
Затронутые версииВерсия исправления

< 3.1.4

3.1.4

EPSS

Процентиль: 39%
0.00178
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-1333
CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).

CVSS3: 7.5
nvd
почти 3 года назад

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).

CVSS3: 7.5
debian
почти 3 года назад

bleach.clean behavior parsing style attributes could result in a regul ...

suse-cvrf
почти 5 лет назад

Security update for python-bleach

EPSS

Процентиль: 39%
0.00178
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-1333
CWE-400