First published: Mon Apr 03 2023(Updated: )
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Configobj Project Configobj | ||
pip/configobj | <=5.0.8 | |
debian/configobj | <=5.0.6-4<=5.0.8-1 | 5.0.9-1 |
pip/configobj | <5.0.9 | 5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.