Vulnerability Name: | CVE-2021-32839 (CCN-209811) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-09-10 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2021-09-10 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-09-29 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32839 Source: XF Type: UNKNOWN sqlparse-cve202132839-dos(209811) Source: MISC Type: Patch, Third Party Advisory https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb Source: CCN Type: sqlparse GIT Repository StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) Source: CONFIRM Type: Third Party Advisory https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-32839 Source: CCN Type: WhiteSource Vulnerability Database WS-2021-0369 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |