GHSA-pjwm-cr36-mwv3

Suggest an improvement
Source
https://github.com/advisories/GHSA-pjwm-cr36-mwv3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-pjwm-cr36-mwv3/GHSA-pjwm-cr36-mwv3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pjwm-cr36-mwv3
Aliases
Published
2024-11-14T22:44:36Z
Modified
2024-11-14T23:12:12.991056Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear CVSS Calculator
Summary
ReDoS in giskard's transformation.py (GHSL-2024-324)
Details

ReDoS in Giskard text perturbation detector

A Remote Code Execution (ReDoS) vulnerability was discovered in Giskard component by the GitHub Security Lab team. When processing datasets with specific text patterns with Giskard detectors, this vulnerability could trigger exponential regex evaluation times, potentially leading to denial of service.

Details

The vulnerability affects Giskard's punctuation removal transformation used in the text perturbation detection. A regex used to detect URLs and links was vulnerable to catastrophic backtracking that could be triggered by specific patterns in the text.

Affected version

Giskard versions prior to 2.15.5 are affected. Users should upgrade to version 2.15.5 or later, which includes a fix for this vulnerability.

Impact

This vulnerability can cause extended computation times or crashes in Giskard when processing text containing certain patterns.

Credit

This issue was discovered and reported by GHSL team member @kevinbackhouse (Kevin Backhouse).

Database specific
{
    "nvd_published_at": "2024-11-14T18:15:26Z",
    "cwe_ids": [
        "CWE-1333"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-11-14T22:44:36Z"
}
References

Affected packages

PyPI / giskard

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.5

Affected versions

0.*

0.1.2

1.*

1.0.0a1
1.0.0a2
1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.4.0
1.5.0
1.6.0
1.7.0a1
1.7.0a2
1.7.0a3
1.7.0a4
1.7.0a5
1.7.0a6
1.7.0a7
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0
1.9.0
1.9.1
1.9.3
1.9.4

2.*

2.0.0b1
2.0.0b2
2.0.0b3
2.0.0b4
2.0.0b5
2.0.0b6
2.0.0b7
2.0.0b8
2.0.0b9
2.0.0b10
2.0.0b11
2.0.0b12
2.0.0b13
2.0.0b14
2.0.0b16
2.0.0b17
2.0.0b18
2.0.0b19
2.0.0b20
2.0.0b22
2.0.0b25
2.0.0b26
2.0.0b27
2.0.0b28
2.0.0b29
2.0.0b30
2.0.0b31
2.0.0b32
2.0.0b33
2.0.0b34
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.1.1
2.1.2
2.1.3
2.2.0
2.3.1
2.3.2
2.4.0
2.5.0
2.5.1
2.5.2
2.5.3
2.6.0
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.7.5
2.7.6
2.7.7
2.8.0
2.9.0
2.9.1
2.10.0
2.11.0
2.12.0
2.13.0
2.14.0
2.14.1
2.14.2
2.14.3
2.14.4
2.14.5
2.14.6
2.15.0
2.15.1
2.15.2
2.15.3
2.15.4

Database specific

{
    "last_known_affected_version_range": "<= 2.15.4"
}