PYSEC-2021-327

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/apprise/PYSEC-2021-327.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2021-327
Aliases
Published
2021-09-20T22:15:00Z
Modified
2023-11-08T04:06:34.460870Z
Summary
[none]
Details

Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is here. The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove apprise/plugins/NotifyIFTTT.py to eliminate the service.

References

Affected packages

PyPI / apprise

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.5.1

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.5.0
0.5.2
0.7.3
0.7.4
0.7.5
0.7.6
0.7.7
0.7.8
0.7.9
0.8.0
0.8.1
0.8.2
0.8.3
0.8.4
0.8.5
0.8.6
0.8.7
0.8.8
0.8.9
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4