Lucene search

K
githubGitHub Advisory DatabaseGHSA-FJ7X-Q9J7-G6Q6
HistoryMar 19, 2024 - 6:30 a.m.

Black vulnerable to Regular Expression Denial of Service (ReDoS)

2024-03-1906:30:52
CWE-1333
GitHub Advisory Database
github.com
16
black package
regular expression denial of service
strings.py
denial of service
untrusted input

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.

Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.

Affected configurations

Vulners
Node
spikes-black_projectspikes-blackRange0wordpress
OR
spikes-black_projectspikes-blackRange<24.3.0wordpress
CPENameOperatorVersion
blackge0
blacklt24.3.0

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%