All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).
**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
                
            References
                    Configurations
                    History
                    13 Feb 2025, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. | 
21 Nov 2024, 07:50
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 3.7  | 
| References | () https://github.com/DiffSK/configobj/issues/232 - Issue Tracking | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BO4RLMYEJODCNUE3DJIIUUFVTPAG6VN/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZHY7B33EFY4LESP2NI4APQUPRROTAZK/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYU4IHVLOTYMFPH7KDOJGKZQR4GKWPFK/ - | |
| References | () https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 - Exploit, Third Party Advisory | 
03 Nov 2023, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
18 Oct 2023, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file. | 
10 Apr 2023, 13:57
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.9  | 
| First Time | 
        
        Configobj Project
         Configobj Project configobj  | 
|
| CPE | cpe:2.3:a:configobj_project:configobj:*:*:*:*:*:*:*:* | |
| CWE | CWE-1333 | |
| References | (MISC) https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494 - Exploit, Third Party Advisory | |
| References | (MISC) https://github.com/DiffSK/configobj/issues/232 - Issue Tracking | 
03 Apr 2023, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-03 05:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-26112
Mitre link : CVE-2023-26112
CVE.ORG link : CVE-2023-26112
JSON object : View
Products Affected
                configobj_project
- configobj
 
CWE
                
                    
                        
                        CWE-1333
                        
            Inefficient Regular Expression Complexity
