CVE-2021-39229

Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack on an inefficient regular expression. The vulnerable regular expression is [here](https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359). The problem has been patched in release version 0.9.5.1. Users who are unable to upgrade are advised to remove `apprise/plugins/NotifyIFTTT.py` to eliminate the service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nuxref:apprise:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
References () https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359 - Exploit, Third Party Advisory () https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359 - Exploit, Third Party Advisory
References () https://github.com/caronc/apprise/pull/436 - Patch, Third Party Advisory () https://github.com/caronc/apprise/pull/436 - Patch, Third Party Advisory
References () https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr - Third Party Advisory () https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr - Third Party Advisory

Information

Published : 2021-09-20 22:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39229

Mitre link : CVE-2021-39229

CVE.ORG link : CVE-2021-39229


JSON object : View

Products Affected

nuxref

  • apprise
CWE
CWE-400

Uncontrolled Resource Consumption