GHSA-c33w-24p9-8m24

Suggest an improvement
Source
https://github.com/advisories/GHSA-c33w-24p9-8m24
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-c33w-24p9-8m24/GHSA-c33w-24p9-8m24.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-c33w-24p9-8m24
Aliases
Related
Published
2023-04-03T06:30:19Z
Modified
2024-12-16T23:00:54.350468Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
configobj ReDoS exploitable by developer using values in a server-side configuration file
Details

All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)((.*)). Note: This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.

Database specific
{
    "nvd_published_at": "2023-04-03T05:15:00Z",
    "cwe_ids": [
        "CWE-1333"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2023-04-04T21:40:45Z"
}
References

Affected packages

PyPI / configobj

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.0.9

Affected versions

4.*

4.4.0
4.5.0
4.5.1
4.5.2
4.5.3
4.6.0
4.7.0
4.7.1
4.7.2

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8