Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-1892
HistoryFeb 28, 2024 - 12:00 a.m.

CVE-2024-1892

2024-02-2800:00:00
ubuntu.com
ubuntu.com
22
vulnerability
scrapy api
redos
high cpu
memory usage
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the
XMLFeedSpider class of the scrapy/scrapy project, specifically in the
parsing of XML content. By crafting malicious XML content that exploits
inefficient regular expression complexity used in the parsing process, an
attacker can cause a denial-of-service (DoS) condition. This vulnerability
allows for the system to hang and consume significant resources,
potentially rendering services that utilize Scrapy for XML processing
unresponsive.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

9.1%