Описание
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)).
Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Ссылки
- Issue Tracking
- ExploitThird Party Advisory
- Issue Tracking
- ExploitThird Party Advisory
Уязвимые конфигурации
EPSS
3.7 Low
CVSS3
5.9 Medium
CVSS3
Дефекты
Связанные уязвимости
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
All versions of the package configobj are vulnerable to Regular Expres ...
EPSS
3.7 Low
CVSS3
5.9 Medium
CVSS3