CVE-2022-40023: mako is vulnerable to Regular Expression Denial of Service
(updated )
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
References
- github.com/advisories/GHSA-v973-fxgf-6xhp
- github.com/pypa/advisory-database/tree/main/vulns/mako/PYSEC-2022-260.yaml
- github.com/sqlalchemy/mako
- github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py
- github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c
- github.com/sqlalchemy/mako/issues/366
- lists.debian.org/debian-lts-announce/2022/09/msg00026.html
- nvd.nist.gov/vuln/detail/CVE-2022-40023
- pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages
- pyup.io/vulnerabilities/CVE-2022-40023/50870
Detect and mitigate CVE-2022-40023 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →