The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability.
References
Link | Resource |
---|---|
https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 | Product |
https://github.com/pytest-dev/py/issues/287 | Exploit Issue Tracking Third Party Advisory |
https://news.ycombinator.com/item?id=34163710 | Issue Tracking Third Party Advisory |
https://pypi.org/project/py | Product |
https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 | Product |
https://github.com/pytest-dev/py/issues/287 | Exploit Issue Tracking Third Party Advisory |
https://news.ycombinator.com/item?id=34163710 | Issue Tracking Third Party Advisory |
https://pypi.org/project/py | Product |
Configurations
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 - Product | |
References | () https://github.com/pytest-dev/py/issues/287 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=34163710 - Issue Tracking, Third Party Advisory | |
References | () https://pypi.org/project/py - Product | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
07 May 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability. |
28 Feb 2023, 15:11
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1333 | |
References |
|
|
References | (MISC) https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 - Product |
18 Oct 2022, 19:50
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:pytest:py:*:*:*:*:*:*:*:* | |
References | (MISC) https://pypi.org/project/py - Product, Third Party Advisory | |
References | (MISC) https://github.com/pytest-dev/py/issues/287 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MISC) https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 - Exploit, Third Party Advisory |
16 Oct 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-16 06:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42969
Mitre link : CVE-2022-42969
CVE.ORG link : CVE-2022-42969
JSON object : View
Products Affected
pytest
- py
CWE
CWE-1333
Inefficient Regular Expression Complexity