All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).
**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
References
Configurations
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. |
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/DiffSK/configobj/issues/232 - Issue Tracking | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BO4RLMYEJODCNUE3DJIIUUFVTPAG6VN/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZHY7B33EFY4LESP2NI4APQUPRROTAZK/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYU4IHVLOTYMFPH7KDOJGKZQR4GKWPFK/ - | |
References | () https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.7 |
Information
Published : 2023-04-03 05:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-26112
Mitre link : CVE-2023-26112
CVE.ORG link : CVE-2023-26112
JSON object : View
Products Affected
configobj_project
- configobj
CWE
CWE-1333
Inefficient Regular Expression Complexity