Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-26112

Опубликовано: 03 апр. 2023
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)). Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

A flaw was found in python-configobj via the Validator function at python-configobj/validate.py. This issue only occurs in the case of a developer putting the offending value in a server side configuration file, which could lead to a Regular Expression Denial of Service (ReDoS).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6python-configobjOut of support scope
Red Hat Enterprise Linux 7python-configobjOut of support scope
Red Hat Enterprise Linux 8python-configobjWill not fix
Red Hat Enterprise Linux 9python-configobjWill not fix
Red Hat OpenShift Dev Spacesdevspaces-udi-containerWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2184017python-configobj: Regular expression denial of service exists in ./src/configobj/validate.py

EPSS

Процентиль: 20%
0.00064
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 3.7
nvd
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

CVSS3: 3.7
debian
около 2 лет назад

All versions of the package configobj are vulnerable to Regular Expres ...

suse-cvrf
почти 2 года назад

Security update for python-configobj

suse-cvrf
почти 2 года назад

Security update for python-configobj

EPSS

Процентиль: 20%
0.00064
Низкий

5.9 Medium

CVSS3