mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/ | third party advisory exploit |
https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879 | third party advisory exploit |
https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6 | third party advisory |
https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html | mailing list |