CVE-2021-32839

3 weeks ago 33

Awaiting Analysis


This vulnerability is presently awaiting analysis.

Description

sqlparse is simply a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 determination is simply a regular Expression Denial of Service successful sqlparse vulnerability. The regular look whitethorn origin exponential backtracking connected strings containing galore repetitions of '\r\n' successful SQL comments. Only the formatting diagnostic that removes comments from SQL statements is affected by this regular expression. As a workaround don't usage the sqlformat.format relation with keyword strip_comments=True oregon the --strip-comments bid enactment emblem erstwhile utilizing the sqlformat bid enactment tool. The issues has been fixed successful sqlparse 0.4.2.


Severity

CVSS 3.x Severity and Metrics:


Nist CVSS people     does not lucifer  with CNA score

CNA:  GitHub, Inc.

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-400 Uncontrolled Resource Consumption Provider acceptance level GitHub, Inc.  

Change History

0 alteration records recovered show changes

Read Entire Article