mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
References
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879 - Exploit, Third Party Advisory | |
References | () https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6 - Patch, Third Party Advisory | |
References | () https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html - | |
References | () https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/ - Exploit, Third Party Advisory |
20 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-01-17 22:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32837
Mitre link : CVE-2021-32837
CVE.ORG link : CVE-2021-32837
JSON object : View
Products Affected
mechanize_project
- mechanize
CWE
CWE-1333
Inefficient Regular Expression Complexity