cve/2023/CVE-2023-26112.md

18 lines
826 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26112](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26112)
![](https://img.shields.io/static/v1?label=Product&message=configobj&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
2024-06-22 09:37:59 +00:00
All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494
#### Github
No PoCs found on GitHub currently.