CVE-2021-32839Uncontrolled Resource Consumption in Project Sqlparse

Severity
7.5HIGHNVD
EPSS
0.1%
top 70.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 20
Latest updateSep 22

Description

sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

debiandebian/sqlparse< sqlparse 0.4.2-1 (bookworm)
NVDsqlparse_project/sqlparse0.4.00.4.2
PyPIsqlparse_project/sqlparse0.4.00.4.2
Debiansqlparse_project/sqlparse< 0.4.1-1+deb11u1+3
CVEListV5andialbrecht/sqlparse>= 0.4.0, < 0.4.2

Patches

🔴Vulnerability Details

3
OSV
CVE-2021-32839: sqlparse is a non-validating SQL parser module for Python2021-09-20
OSV
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)2021-09-10
GHSA
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)2021-09-10

📋Vendor Advisories

3
Ubuntu
SQL parse vulnerability2021-09-22
Red Hat
python-sqlparse: ReDoS via regular expression in StripComments filter2021-09-10
Debian
CVE-2021-32839: sqlparse - sqlparse is a non-validating SQL parser module for Python. In sqlparse versions ...2021