First published: Sun Oct 16 2022(Updated: )
The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/py | <=1.11.0 | |
pytest | <=1.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42969 is considered a moderate severity vulnerability due to its potential for a ReDoS attack.
To mitigate CVE-2022-42969, upgrade the py library to version 1.11.1 or newer.
In the context of CVE-2022-42969, a ReDoS attack targets vulnerable regular expressions to exhaust server resources.
CVE-2022-42969 affects the py library and its integration in Python applications up to version 1.11.0.
Yes, CVE-2022-42969 can be exploited remotely by attackers through crafted data in Subversion repositories.