CVE-2022-39280

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-39280
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39280.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-39280
Aliases
Published
2022-10-06T18:16:18Z
Modified
2024-05-14T11:12:01.352865Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version 0.5.2, all the users are advised to upgrade to 0.5.2 as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.

References

Affected packages

Git / github.com/pyupio/dparse

Affected ranges

Type
GIT
Repo
https://github.com/pyupio/dparse
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.1.0
0.1.1
0.2.0
0.2.1
0.3.0
0.4
0.4.1
0.5.0
0.5.1