Inefficient Regular Expression Complexity Affecting python-bleach package, versions <3.1.4-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Inefficient Regular Expression Complexity vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PYTHONBLEACH-561567
  • published31 Mar 2020
  • disclosed16 Feb 2023

Introduced: 31 Mar 2020

CVE-2020-6817  (opens in a new tab)
CWE-1333  (opens in a new tab)

How to fix?

Upgrade Debian:unstable python-bleach to version 3.1.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-bleach package and not the python-bleach package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).

CVSS Base Scores

version 3.1