CVE-2023-26112

CVSS V2 None CVSS V3 None
Description
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Overview
  • CVE ID
  • CVE-2023-26112
  • Assigner
  • report@snyk.io
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-04-03T05:15:07
  • Last Modified Date
  • 2023-04-10T13:57:52
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:configobj_project:configobj:*:*:*:*:*:*:*:* 1 OR
References
Reference URL Reference Tags
https://github.com/DiffSK/configobj/issues/232 Issue Tracking
https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2023-04-17 04:01:59 Added to TrackCVE
2023-04-17 04:02:03 Weakness Enumeration new