Lucene search

K
freebsdFreeBSDDE970AEF-D60E-466B-8E30-1AE945A047F1
HistoryApr 03, 2023 - 12:00 a.m.

py39-configobj -- vulnerable to Regular Expression Denial of Service

2023-04-0300:00:00
vuxml.freebsd.org
9
regular expression denial of service
redos
configobj
validate function
developer
server side configuration file
unix

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.0%

DarkTinia reports:

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)).
Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchpy39-configobj<= 5.0.6_1UNKNOWN

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.0%