{ "schema_version": "1.4.0", "id": "GHSA-8fg9-p83m-x5pq", "modified": "2024-11-18T16:26:27Z", "published": "2022-09-27T15:28:00Z", "aliases": [ "CVE-2022-39280" ], "summary": "ReDoS issue in dparse", "details": "### Impact\ndparse versions prior to 0.5.1 contain a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service).\n\nAll users parsing index server URLs with dparse are impacted by this vulnerability.\n\n### Patches\nThe Patch is applied in the `0.5.2` version, all users are recommended to upgrade as soon as possible.\n\n### Workarounds\nAvoid passing index server URLs in the source file to be parsed.\n\n### References\n[https://github.com/pyupio/dparse/tree/security/remove-intensive-regex](https://github.com/pyupio/dparse/tree/security/remove-intensive-regex)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at [support@pyup.io](mailto:support@pyup.io)\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "dparse" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.5.2" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/pyupio/dparse/security/advisories/GHSA-8fg9-p83m-x5pq" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39280" }, { "type": "WEB", "url": "https://github.com/pyupio/dparse/commit/8c990170bbd6c0cf212f1151e9025486556062d5" }, { "type": "WEB", "url": "https://github.com/pyupio/dparse/commit/d87364f9db9ab916451b1b036cfeb039e726e614" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/dparse/PYSEC-2022-301.yaml" }, { "type": "PACKAGE", "url": "https://github.com/pyupio/dparse" }, { "type": "WEB", "url": "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS" } ], "database_specific": { "cwe_ids": [ "CWE-1333", "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-09-27T15:28:00Z", "nvd_published_at": "2022-10-06T18:16:00Z" } }