pypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. An attacker who uses this vulnerability can craft a PDF which leads to unexpected long runtime. This quadratic runtime blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. This issue has been addressed in PR 808 and versions from 1.27.9 include this fix. Users are advised to upgrade. There are no known workarounds for this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/py-pdf/pypdf/issues/582 | Exploit Issue Tracking Vendor Advisory | 
| https://github.com/py-pdf/pypdf/pull/808 | Patch | 
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw | Exploit Patch Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html | |
| https://github.com/py-pdf/pypdf/issues/582 | Exploit Issue Tracking Vendor Advisory | 
| https://github.com/py-pdf/pypdf/pull/808 | Patch | 
| https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw | Exploit Patch Vendor Advisory | 
| https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html | 
Configurations
                    History
                    21 Nov 2024, 08:10
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/py-pdf/pypdf/pull/808 - Patch | |
| References | () https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00019.html - | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.2  | 
14 Jul 2023, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
10 Jul 2023, 16:28
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Pypdf Project
         Pypdf Project pypdf  | 
|
| CPE | cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:* | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.5  | 
| References | (MISC) https://github.com/py-pdf/pypdf/security/advisories/GHSA-jrm6-h9cq-8gqw - Exploit, Patch, Vendor Advisory | |
| References | (MISC) https://github.com/py-pdf/pypdf/issues/582 - Exploit, Issue Tracking, Vendor Advisory | |
| References | (MISC) https://github.com/py-pdf/pypdf/pull/808 - Patch | 
30 Jun 2023, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-06-30 19:15
Updated : 2024-11-21 08:10
NVD link : CVE-2023-36810
Mitre link : CVE-2023-36810
CVE.ORG link : CVE-2023-36810
JSON object : View
Products Affected
                pypdf_project
- pypdf
 
CWE
                
                    
                        
                        CWE-407
                        
            Inefficient Algorithmic Complexity
