Bug 2006118 (CVE-2021-32838)

Summary: CVE-2021-32838 python-flask-restx: Regular expression denial of service in email_regex
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jpopelka
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-09-21 00:21:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2006119    
Bug Blocks:    

Description Pedro Sampaio 2021-09-20 21:30:17 UTC
Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.

https://github.com/python-restx/flask-restx/issues/372
https://pypi.org/project/flask-restx/
https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da
https://github.com/advisories/GHSA-3q6g-vf58-7m4g
https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51

Comment 1 Pedro Sampaio 2021-09-20 21:30:32 UTC
Created python-flask-restx tracking bugs for this issue:

Affects: fedora-all [bug 2006119]

Comment 2 Product Security DevOps Team 2021-09-21 00:21:21 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.