CVE-2020-7212 – urllib3
Package
Manager: pip
Name: urllib3
Vulnerable Version: >=1.25.2 <1.25.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01551 pctl0.80733
Details
Uncontrolled Resource Consumption in urllib3 The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2).
Metadata
Created: 2021-04-30T17:31:43Z
Modified: 2024-11-18T22:23:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-hmv2-79q8-fv6g/GHSA-hmv2-79q8-fv6g.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-hmv2-79q8-fv6g
Finding: F067
Auto approve: 1