
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-39280 affects the Dependency Parser (dparse) package versions <0.5.1, which contains a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability was discovered on August 12, 2022, and affects all users parsing index server URLs with dparse (GitHub Security Lab, GitHub Advisory).
The vulnerability exists in the URL validation regex pattern used for parsing index server URLs. When processing certain crafted inputs, the regular expression engine can enter an extreme state causing exponential processing time relative to input size. This is due to inefficient pattern matching that creates multiple possible paths for the regex engine to explore through backtracking (OWASP ReDoS).
When exploited, this vulnerability can lead to a denial of service condition by causing the application to hang for extended periods while processing specially crafted input. All users parsing index server URLs with dparse versions prior to 0.5.1 are impacted by this vulnerability (GitHub Advisory).
The vulnerability has been patched in version 0.5.2 of dparse. Users should upgrade to version 0.5.2 or later as soon as possible. As a temporary workaround, users can avoid passing index server URLs in the source file to be parsed (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."