You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Regular Expression Denial of Service (ReDoS)
Vulnerable module: py
Introduced through: pytest@6.1.2
Detailed paths
Introduced through: HHS/TANF-app@HHS/TANF-app › pytest@6.1.2 › py@1.9.0
Overview
py is an a Python development support library.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). The subpattern \d+\s*\S+ is ambiguous which makes the pattern subject to catastrophic backtracing given a string like "1" * 5000.
SVN blame output seems to always have at least one space between the revision number and the user name, so the ambiguity can be fixed by changing the * to +.
Here is the issue from Snyk:
You can find a detailed explanation here
The text was updated successfully, but these errors were encountered: