GMS-2022-4614: Duplicate of ./pypi/dparse/CVE-2022-39280.yml
(updated )
dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to ReDoS. All users parsing index server URLs with dparse are impacted by this vulnerability. The Patch is applied in the 0.5.2
version, all users are recommended to upgrade as soon as possible. Workarounds: Avoid passing index server URLs in the source file to be parsed. If you have any questions or comments about this advisory, email us at support@pyup.io
References
Detect and mitigate GMS-2022-4614 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →