GHSA-p5w8-wqhj-9hhf

Suggest an improvement
Source
https://github.com/advisories/GHSA-p5w8-wqhj-9hhf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-p5w8-wqhj-9hhf/GHSA-p5w8-wqhj-9hhf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p5w8-wqhj-9hhf
Aliases
Published
2021-09-10T17:56:06Z
Modified
2024-10-28T14:32:10.822576Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)
Details

Impact

The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.

Patches

The issues has been fixed in sqlparse 0.4.2.

Workarounds

Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool.

References

This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a CodeQL query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following this link.

For more information

If you have any questions or comments about this advisory: * Open an issue in sqlparse issue tracker * Email us at albrecht.andi@gmail.com

References

Affected packages

PyPI / sqlparse

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.4.0
Fixed
0.4.2

Affected versions

0.*

0.4.0
0.4.1