CVE-2021-32848

Octobox is software for managing GitHub notifications. Prior to pull request (PR) 2807, a user of the system can provide a specifically crafted search query string that will trigger a ReDoS vulnerability. This issue is fixed in PR 2807.
Configurations

Configuration 1 (hide)

cpe:2.3:a:octobox_project:octobox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/octobox/octobox/blob/372a0da981dbf47319fed4116364118fdf09fcc3/lib/search_parser.rb#L5 - Exploit, Product () https://github.com/octobox/octobox/blob/372a0da981dbf47319fed4116364118fdf09fcc3/lib/search_parser.rb#L5 - Exploit, Product
References () https://github.com/octobox/octobox/pull/2807 - Patch () https://github.com/octobox/octobox/pull/2807 - Patch
References () https://securitylab.github.com/advisories/GHSL-2021-100-octobox-octobox/ - Exploit, Third Party Advisory () https://securitylab.github.com/advisories/GHSL-2021-100-octobox-octobox/ - Exploit, Third Party Advisory

Information

Published : 2023-02-20 17:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32848

Mitre link : CVE-2021-32848

CVE.ORG link : CVE-2021-32848


JSON object : View

Products Affected

octobox_project

  • octobox
CWE
CWE-770

Allocation of Resources Without Limits or Throttling

CWE-1333

Inefficient Regular Expression Complexity