This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9.-]+.[a-zA-Z0-9.-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
{
"github_reviewed": true,
"github_reviewed_at": "2021-03-13T01:08:09Z",
"severity": "MODERATE",
"nvd_published_at": "2021-02-01T20:15:00Z",
"cwe_ids": [
"CWE-400"
]
}