mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879 | Exploit Third Party Advisory |
https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6 | Patch Third Party Advisory |
https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html | |
https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-17 22:15
Updated : 2023-06-20 17:15
NVD link : CVE-2021-32837
Mitre link : CVE-2021-32837
CVE.ORG link : CVE-2021-32837
JSON object : View
Products Affected
mechanize_project
- mechanize
CWE
CWE-1333
Inefficient Regular Expression Complexity