CVE-2021-33503

Severity
7.5HIGH
EPSS
0.9%
top 24.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 29
Latest updateJan 19

Description

An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

PyPIurllib31.25.41.26.5
NVDpython/urllib31.25.41.26.5
Debianpython-urllib3< 1.26.5-1~exp1+3
NVDoracle/instantis_enterprisetrack17.1, 17.2, 17.3+2

Also affects: Fedora 33, 34

Patches

🔴Vulnerability Details

4
OSV
CVE-2021-33503: An issue was discovered in urllib3 before 12021-06-29
CVEList
CVE-2021-33503: An issue was discovered in urllib3 before 12021-06-29
OSV
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters2021-06-01
GHSA
Catastrophic backtracking in URL authority parser when passed URL containing many @ characters2021-06-01

📋Vendor Advisories

4
Ubuntu
urllib3 vulnerability2023-01-19
Microsoft
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component the authority regular expression exhibits catastrophic backtracking c2021-06-08
Red Hat
python-urllib3: ReDoS in the parsing of authority part of URL2021-06-01
Debian
CVE-2021-33503: python-urllib3 - An issue was discovered in urllib3 before 1.26.5. When provided with a URL conta...2021
CVE-2021-33503 (HIGH CVSS 7.5) | An issue was discovered in urllib3 | cvebase.io