logo

GHSA-r8wq-qrxc-hmcm python-ldap

Package

Manager: pip
Name: python-ldap
Vulnerable Version: >=0 <3.4.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

ReDoS in LDAP schema parser https://github.com/python-ldap/python-ldap/issues/424 ### Impact The LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source. ### Patches The upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes. ### Workarounds As a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical. ### References [CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker

Metadata

Created: 2021-11-29T17:58:59Z
Modified: 2021-11-26T18:26:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-r8wq-qrxc-hmcm/GHSA-r8wq-qrxc-hmcm.json
CWE IDs: ["CWE-1333"]
Alternative ID: N/A
Finding: F211
Auto approve: 1