Svi
Pretraži prema proizvođaču
Pretraži prema CWE oznaci
O usluzi
Pretplate
Jezik
hr
en
CVE-2022-40023 - CERT CVE
CVE-2022-40023
ID
CVE-2022-40023
Sažetak
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
Reference
https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21
https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c
https://github.com/sqlalchemy/mako/issues/366
https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html
https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
https://pyup.io/vulnerabilities/CVE-2022-40023/50870/
https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21
https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c
https://github.com/sqlalchemy/mako/issues/366
https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html
https://lists.debian.org/debian-lts-announce/2025/12/msg00004.html
https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
https://pyup.io/vulnerabilities/CVE-2022-40023/50870/
CVSS
Base:
7.5
Impact:
3.6
Exploitability:
3.9
Pristup
Vektor
Složenost
Autentikacija
NETWORK
LOW
NONE
Impact
Povjerljivost
Cjelovitost
Dostupnost
NONE
NONE
HIGH
CVSS vektor
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Zadnje važnije ažuriranje
03-12-2025 - 07:16
Objavljeno
07-09-2022 - 13:15