Skip to content

cleo is vulnerable to Regular Expression Denial of Service (ReDoS)

Moderate severity GitHub Reviewed Published Nov 10, 2022 to the GitHub Advisory Database • Updated Sep 3, 2023

Package

pip cleo (pip)

Affected versions

<= 1.0.0a5

Patched versions

1.0.0

Description

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method.

References

Published by the National Vulnerability Database Nov 9, 2022
Published to the GitHub Advisory Database Nov 10, 2022
Reviewed Nov 10, 2022
Last updated Sep 3, 2023

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2022-42966

GHSA ID

GHSA-2p9h-ccw7-33gf

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.