Miggo Logo

CVE-2022-42969:
ReDoS in py library when used with subversion

7.5

CVSS Score

Basic Information

EPSS Score
-
Published
10/16/2022
Updated
10/21/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
pypip<= 1.11.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the regular expression defined in InfoSvnCommand.lspattern, which is used to parse SVN repository info data. The regex contains multiple overlapping capture groups (e.g., .+? for author matching followed by optional size groups) and ambiguous space quantifiers (* and +) that can lead to exponential backtracking. When processing attacker-controlled input with excessive spaces (as demonstrated in the PoC), this causes polynomial/combinatorial regex complexity. The init method directly uses this regex for parsing, making both the regex definition and its usage point vulnerable. The code location and attack vector are explicitly referenced in multiple sources including GitHub advisories and NVD records.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** py li*r*ry t*rou** *.**.* *or Pyt*on *llows r*mot* *tt**k*rs to *on*u*t * R**oS (R**ul*r *xpr*ssion **ni*l o* S*rvi**) *tt**k vi* * Su*v*rsion r*pository wit* *r**t** in*o **t*, ****us* t** In*oSvn*omm*n* *r*um*nt is mis**n*l**. T** p*rti*ul*r *

Reasoning

T** vuln*r**ility st*ms *rom t** r**ul*r *xpr*ssion ***in** in In*oSvn*omm*n*.lsp*tt*rn, w*i** is us** to p*rs* SVN r*pository in*o **t*. T** r***x *ont*ins multipl* ov*rl*ppin* **ptur* *roups (*.*., .+? *or *ut*or m*t**in* *ollow** *y option*l siz*