giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. References: https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53 https://github.com/returntocorp/semgrep/pull/7611 https://github.com/returntocorp/semgrep/pull/7943 https://github.com/returntocorp/semgrep/pull/7955 See also: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33290
Created python-git-url-parse tracking bugs for this issue: Affects: epel-all [bug 2217042] Affects: fedora-all [bug 2217041]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.