There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "3.6.14"
},
{
"introduced": "3.7.0"
},
{
"fixed": "3.7.11"
},
{
"introduced": "3.8.0"
},
{
"fixed": "3.8.10"
},
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.5"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:python:python:3.10.0:-:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "3.10.0-NA"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "33"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "34"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "35"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "36"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
]
}
]
}