Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
References
Link | Resource |
---|---|
https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c | Patch |
https://pyup.io/vulnerabilities/CVE-2022-40023/50870/ | Third Party Advisory |
https://github.com/sqlalchemy/mako/issues/366 | Issue Tracking Patch |
https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html | Mailing List Third Party Advisory |
https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ | Exploit Third Party Advisory |
Information
Published : 2022-09-07 06:15
Updated : 2023-02-28 18:10
NVD link : CVE-2022-40023
Mitre link : CVE-2022-40023
JSON object : View
CWE
Products Affected
debian
- debian_linux
sqlalchemy
- mako