Watemlifts / Python-100-Days

Python - 100天从新手到大师
1 stars 0 forks source link

CVE-2023-30608 (High) detected in sqlparse-0.4.2-py3-none-any.whl - autoclosed #74

Closed mend-bolt-for-github[bot] closed 1 month ago

mend-bolt-for-github[bot] commented 6 months ago

CVE-2023-30608 - High Severity Vulnerability

Vulnerable Library - sqlparse-0.4.2-py3-none-any.whl

A non-validating SQL parser.

Library home page: https://files.pythonhosted.org/packages/05/40/d836d55fb3f467243ee839ab7b814822fda522cd395fa41e282684e71ee5/sqlparse-0.4.2-py3-none-any.whl

Path to dependency file: /Day41-55/code/oa/requirements.txt

Path to vulnerable library: /Day41-55/code/oa/requirements.txt

Dependency Hierarchy: - Django-3.2.13-py3-none-any.whl (Root Library) - :x: **sqlparse-0.4.2-py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: 53c8f2d511b1d277a31286a85a37f1a7903e3e37

Found in base branch: master

Vulnerability Details

sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.

Publish Date: 2023-04-18

URL: CVE-2023-30608

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2

Release Date: 2023-04-18

Fix Resolution: sqlparse - 0.4.4


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 month ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.