Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2023-26112
Description:All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
Test IDs: 1.3.6.1.4.1.25623.1.1.2.2025.1196   1.3.6.1.4.1.25623.1.1.2.2024.1514   1.3.6.1.4.1.25623.1.1.2.2024.1493   1.3.6.1.4.1.25623.1.1.2.2024.1292   1.3.6.1.4.1.25623.1.1.2.2024.1699   1.3.6.1.4.1.25623.1.1.2.2024.2656   1.3.6.1.4.1.25623.1.1.12.2024.7040.1   1.3.6.1.4.1.25623.1.1.2.2024.1367   1.3.6.1.4.1.25623.1.1.2.2024.1094   1.3.6.1.4.1.25623.1.1.2.2025.1163   1.3.6.1.4.1.25623.1.1.2.2025.1180   1.3.6.1.4.1.25623.1.1.2.2024.1664   1.3.6.1.4.1.25623.1.1.2.2024.1388   1.3.6.1.4.1.25623.1.1.2.2025.1144   1.3.6.1.4.1.25623.1.1.4.2023.3368.1   1.3.6.1.4.1.25623.1.1.2.2024.1161   1.3.6.1.4.1.25623.1.0.885035   1.3.6.1.4.1.25623.1.1.12.2024.7040.2   1.3.6.1.4.1.25623.1.1.2.2024.1070   1.3.6.1.4.1.25623.1.0.885037   1.3.6.1.4.1.25623.1.0.885185   1.3.6.1.4.1.25623.1.1.2.2024.2622  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2023-26112
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BO4RLMYEJODCNUE3DJIIUUFVTPAG6VN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZHY7B33EFY4LESP2NI4APQUPRROTAZK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYU4IHVLOTYMFPH7KDOJGKZQR4GKWPFK/
https://github.com/DiffSK/configobj/issues/232
https://github.com/DiffSK/configobj/issues/232
https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494
https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494




© 1998-2025 E-Soft Inc. All rights reserved.