The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 | Product | 
| https://github.com/pytest-dev/py/issues/287 | Exploit Issue Tracking Third Party Advisory | 
| https://news.ycombinator.com/item?id=34163710 | Issue Tracking Third Party Advisory | 
| https://pypi.org/project/py | Product | 
| https://github.com/pytest-dev/py/blob/cb87a83960523a2367d0f19226a73aed4ce4291d/py/_path/svnurl.py#L316 | Product | 
| https://github.com/pytest-dev/py/issues/287 | Exploit Issue Tracking Third Party Advisory | 
| https://news.ycombinator.com/item?id=34163710 | Issue Tracking Third Party Advisory | 
| https://pypi.org/project/py | Product | 
Configurations
                    History
                    No history.
Information
                Published : 2022-10-16 06:15
Updated : 2025-05-14 15:15
NVD link : CVE-2022-42969
Mitre link : CVE-2022-42969
CVE.ORG link : CVE-2022-42969
JSON object : View
Products Affected
                pytest
- py
CWE
                
                    
                        
                        CWE-1333
                        
            Inefficient Regular Expression Complexity
