Lucene search

K
freebsdFreeBSD46419E8C-65D9-11EF-AC06-B0416F0C4C67
HistoryApr 03, 2023 - 12:00 a.m.

Configobj -- Regular Expression Denial of Service attack

2023-04-0300:00:00
vuxml.freebsd.org
2
configobj
regular expression denial of service
validate function
server side configuration file
unix

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

50.0%

[email protected] reports:

All versions of the package configobj are vulnerable to Regular
Expression Denial of Service (ReDoS) via the validate function,
using (.+?)((.*)).Note: This is only exploitable in the case
of a developer putting the offending value in a server side
configuration file.

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0.001

Percentile

50.0%