CVE-2021-39229

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-39229
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-39229.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-39229
Aliases
Published
2021-09-20T22:15:07Z
Modified
2024-05-14T10:35:18.923016Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is here. The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove apprise/plugins/NotifyIFTTT.py to eliminate the service.

References

Affected packages

Git / github.com/caronc/apprise

Affected ranges

Type
GIT
Repo
https://github.com/caronc/apprise
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.7
v0.0.8
v0.0.9
v0.5.0
v0.5.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.7.7
v0.7.8
v0.7.9
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.8.5
v0.8.6
v0.8.7
v0.8.8
v0.8.9
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4
v0.9.5