CVE-2023-26112
Published: 3 April 2023
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Notes
Author | Note |
---|---|
mdeslaur | per advisory: "This is only exploitable in the case of a developer, putting the offending value in a server side configuration file" |
iconstantin | as of 2024-01-08, the proposed fix has not yet been committed |
Priority
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |