Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. dparse
  4. ›
  5. GMS-2022-4614

GMS-2022-4614: Duplicate of ./pypi/dparse/CVE-2022-39280.yml

September 27, 2022 (updated October 7, 2022)

dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to ReDoS. All users parsing index server URLs with dparse are impacted by this vulnerability. The Patch is applied in the 0.5.2 version, all users are recommended to upgrade as soon as possible. Workarounds: Avoid passing index server URLs in the source file to be parsed. If you have any questions or comments about this advisory, email us at support@pyup.io

References

  • github.com/advisories/GHSA-8fg9-p83m-x5pq
  • github.com/pyupio/dparse/security/advisories/GHSA-8fg9-p83m-x5pq

Code Behaviors & Features

Detect and mitigate GMS-2022-4614 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.5.2

Fixed versions

  • 0.5.2

Solution

Upgrade to version 0.5.2 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Source file

pypi/dparse/GMS-2022-4614.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:54 +0000.