Skip to content

CWE-730 Regex injection with IFTTT Plugin

High severity GitHub Reviewed Published Sep 20, 2021 in caronc/apprise • Updated Feb 1, 2023

Package

pip apprise (pip)

Affected versions

<= 0.9.4

Patched versions

0.9.5.1

Description

Impact

Anyone publicly hosting the Apprise library and granting them access to the IFTTT notification service.

Patches

Update to Apprise v0.9.5.1

# Install Apprise v0.9.5.1 from PyPI
pip install apprise==0.9.5.1

The patch to the problem was performed here.

Workarounds

Alternatively, if upgrading is not an option, you can safely remove the following file:

  • apprise/plugins/NotifyIFTTT.py

The above will eliminate the ability to use IFTTT, but everything else will work smoothly.

For more information

If you have any questions or comments about this advisory:

Additional Credit

Github would not allow me to additionally credit Rasmus Petersen, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited

Additional Notes:

  • Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)

References

@caronc caronc published to caronc/apprise Sep 20, 2021
Reviewed Sep 20, 2021
Published to the GitHub Advisory Database Sep 20, 2021
Published by the National Vulnerability Database Sep 20, 2021
Last updated Feb 1, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2021-39229

GHSA ID

GHSA-qhmp-h54x-38qr

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.