GHSA-pq64-v7f5-gqh8

Suggest an improvement
Source
https://github.com/advisories/GHSA-pq64-v7f5-gqh8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-pq64-v7f5-gqh8/GHSA-pq64-v7f5-gqh8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pq64-v7f5-gqh8
Aliases
Published
2021-03-29T16:33:03Z
Modified
2024-02-22T05:36:41.170318Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Pygments vulnerable to Regular Expression Denial of Service (ReDoS)
Details

In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.

References

Affected packages

PyPI / pygments

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.1
Fixed
2.7.4

Affected versions

1.*

1.1
1.1.1
1.2
1.2.1
1.2.2
1.3
1.3.1
1.4
1.5
1.6rc1
1.6

2.*

2.0rc1
2.0
2.0.1
2.0.2
2.1
2.1.1
2.1.2
2.1.3
2.2.0
2.3.0
2.3.1
2.4.0
2.4.1
2.4.2
2.5.1
2.5.2
2.6.0
2.6.1
2.7.0
2.7.1
2.7.2
2.7.3