CVE-2023-26112

Published Apr 3, 2023

Last updated 10 days ago

Overview

Description
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Source
report@snyk.io
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
5.9
Impact score
3.6
Exploitability score
2.2
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
MEDIUM

Weaknesses

report@snyk.io
CWE-1333
nvd@nist.gov
CWE-1333

Social media

Hype score
Not currently trending

Configurations