logo

CVE-2022-39280 dparse

Package

Manager: pip
Name: dparse
Vulnerable Version: >=0 <0.5.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00134 pctl0.33847

Details

ReDoS issue in dparse ### Impact dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). All users parsing index server URLs with dparse are impacted by this vulnerability. ### Patches The Patch is applied in the `0.5.2` version, all users are recommended to upgrade as soon as possible. ### Workarounds Avoid passing index server URLs in the source file to be parsed. ### References [https://github.com/pyupio/dparse/tree/security/remove-intensive-regex](https://github.com/pyupio/dparse/tree/security/remove-intensive-regex) ### For more information If you have any questions or comments about this advisory: * Email us at [support@pyup.io](mailto:support@pyup.io)

Metadata

Created: 2022-09-27T15:28:00Z
Modified: 2024-11-18T16:26:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-8fg9-p83m-x5pq/GHSA-8fg9-p83m-x5pq.json
CWE IDs: ["CWE-1333", "CWE-400"]
Alternative ID: GHSA-8fg9-p83m-x5pq
Finding: F211
Auto approve: 1