CVE-2023-30608

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30608
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30608.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-30608
Aliases
Downstream
Related
Published
2023-04-18T21:32:11Z
Modified
2025-10-08T14:19:21.006430Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Parser contains an inefficient regular expression in sqlparse
Details

sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit e75e358. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit c457abd5f. Users are advised to upgrade. There are no known workarounds for this issue.

References

Affected packages

Git / github.com/andialbrecht/sqlparse

Affected ranges

Type
GIT
Repo
https://github.com/andialbrecht/sqlparse
Events

Affected versions

0.*

0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.2.0
0.2.1
0.2.2
0.2.3
0.2.4
0.3.0
0.3.1
0.4.0
0.4.1
0.4.2
0.4.3