All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).
**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
References
Configurations
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. |
Information
Published : 2023-04-03 05:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-26112
Mitre link : CVE-2023-26112
CVE.ORG link : CVE-2023-26112
JSON object : View
Products Affected
configobj_project
- configobj
CWE
CWE-1333
Inefficient Regular Expression Complexity