Flask RESTX contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex
.
CPE | Name | Operator | Version |
---|---|---|---|
flask-restx | eq | 0.5.0 | |
flask-restx | eq | 0.1.0 | |
flask-restx | eq | 0.4.0 | |
flask-restx | eq | 0.2.0 | |
flask-restx | eq | 0.3.0 | |
flask-restx | eq | 0.1.1 | |
flask-restx | eq | 0.0.1.dev0 |
github.com/advisories/GHSA-3q6g-vf58-7m4g
github.com/python-restx/flask-restx
github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51
github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da
github.com/python-restx/flask-restx/issues/372
github.com/python-restx/flask-restx/security/advisories/GHSA-3q6g-vf58-7m4g
lists.fedoraproject.org/archives/list/[email protected]/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ
lists.fedoraproject.org/archives/list/[email protected]/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3
nvd.nist.gov/vuln/detail/CVE-2021-32838
pypi.org/project/flask-restx