PYSEC-2022-301

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/dparse/PYSEC-2022-301.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2022-301
Aliases
Published
2022-10-06T18:16:00Z
Modified
2023-11-08T04:10:17.529680Z
Summary
[none]
Details

dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version 0.5.2, all the users are advised to upgrade to 0.5.2 as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.

References

Affected packages

PyPI / dparse

Package

Affected ranges

Type
GIT
Repo
https://github.com/pyupio/dparse
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.2

Affected versions

0.*

0.1.0
0.1.1
0.2.0
0.2.1
0.3.0
0.4.0
0.4.1
0.5.0
0.5.1