-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from the regex pattern used for header validation in waitress/rfc7230.py. The commit diff shows critical changes to FIELD_CONTENT and FIELD_VALUE regex components that were causing catastrophic backtracking. Though no specific function name is mentioned, the HEADER_FIELD regex compilation is the direct vulnerable component as it processes incoming headers. The patch replaced ambiguous quantifiers with more specific patterns (+ and non-capturing groups) to prevent backtracking. Test cases added in test_parser.py validate this fix by sending malicious headers that previously caused DoS.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| waitress | pip | = 1.4.2 | 1.4.3 |
Ongoing coverage of React2Shell