sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit e75e358
. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit c457abd5f
. Users are advised to upgrade. There are no known workarounds for this issue.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sqlparse | Sqlparse_project | 0.1.15 (including) | 0.4.4 (excluding) |
Red Hat Satellite 6.14 for RHEL 8 | RedHat | python-sqlparse-0:0.4.4-1.el8pc | * |
Red Hat Satellite 6.14 for RHEL 8 | RedHat | python-sqlparse-0:0.4.4-1.el8pc | * |
RHUI 4 for RHEL 8 | RedHat | python-sqlparse-0:0.4.4-1.0.1.el8ui | * |
Sqlparse | Ubuntu | bionic | * |
Sqlparse | Ubuntu | devel | * |
Sqlparse | Ubuntu | focal | * |
Sqlparse | Ubuntu | jammy | * |
Sqlparse | Ubuntu | kinetic | * |
Sqlparse | Ubuntu | lunar | * |
Sqlparse | Ubuntu | trusty | * |
Sqlparse | Ubuntu | upstream | * |
Sqlparse | Ubuntu | xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.