
Cloud Vulnerability DB
A community-led vulnerabilities database
The _encode_invalid_chars function in util/url.py in the urllib3 library versions 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) due to an inefficient algorithm. The vulnerability was discovered and disclosed in March 2020 (NVD).
The vulnerability exists in the _encode_invalid_chars function within the url.py utility module. The issue stems from an inefficient algorithm where the percent_encodings array contains problematic implementation that leads to excessive CPU usage. This affects urllib3 versions from 1.25.2 to 1.25.7 (Ubuntu CVE).
The vulnerability can be exploited to cause a denial of service condition through CPU consumption, potentially affecting the availability of applications using the affected versions of urllib3 (NVD).
The recommended mitigation is to upgrade urllib3 to version 1.25.8 or later which contains the fix for this vulnerability. The fix includes optimizations to the _encode_invalid_chars function to prevent excessive CPU consumption (PyPI).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."