-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| python-ldap | pip | < 3.4.0 | 3.4.0 |
The vulnerability stems from the LDAP schema parser's handling of regex patterns when processing untrusted schemas. The advisory explicitly mentions ldap.schema usage and ReDoS via crafted regex input. The SubSchema class is central to schema parsing, and OID parsing functions are common targets for regex-based vulnerabilities. The patch's focus on limiting backslashes suggests these components processed escape sequences with inefficient regex patterns. While exact line numbers aren't available, the module structure and vulnerability context strongly implicate these functions.
KEV Misses 88% of Exploited CVEs- Get the report