CVE-2023-32758

giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:coala:git-url-parse:*:*:*:*:*:*:*:*
cpe:2.3:a:semgrep:semgrep:*:*:*:*:*:*:*:*

History

23 Jan 2025, 20:15

Type Values Removed Values Added
References (MISC) https://pypi.org/project/git-url-parse - Product () https://pypi.org/project/git-url-parse - Product
References (MISC) https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53 - Product () https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53 - Product
References (MISC) https://github.com/returntocorp/semgrep/pull/7955 - () https://github.com/returntocorp/semgrep/pull/7955 -
References (MISC) https://github.com/returntocorp/semgrep/pull/7943 - () https://github.com/returntocorp/semgrep/pull/7943 -
References (MISC) https://github.com/returntocorp/semgrep/pull/7611 - Issue Tracking, Patch () https://github.com/returntocorp/semgrep/pull/7611 - Issue Tracking, Patch

09 Jun 2023, 19:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/returntocorp/semgrep/pull/7943 -
  • (MISC) https://github.com/returntocorp/semgrep/pull/7955 -

06 Jun 2023, 18:15

Type Values Removed Values Added
Summary giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep through 1.21.0, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package. giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep 1.5.2 through 1.24.1, is vulnerable to ReDoS (Regular Expression Denial of Service) if parsing untrusted URLs. This might be relevant if Semgrep is analyzing an untrusted package (for example, to check whether it accesses any Git repository at an http:// URL), and that package's author placed a ReDoS attack payload in a URL used by the package.

26 May 2023, 18:53

Type Values Removed Values Added
References (MISC) https://pypi.org/project/git-url-parse - (MISC) https://pypi.org/project/git-url-parse - Product
References (MISC) https://github.com/returntocorp/semgrep/pull/7611 - (MISC) https://github.com/returntocorp/semgrep/pull/7611 - Issue Tracking, Patch
References (MISC) https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53 - (MISC) https://github.com/coala/git-url-parse/blob/master/giturlparse/parser.py#L53 - Product
First Time Semgrep semgrep
Coala
Coala git-url-parse
Semgrep
CWE CWE-1333
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:semgrep:semgrep:*:*:*:*:*:*:*:*
cpe:2.3:a:coala:git-url-parse:*:*:*:*:*:*:*:*

15 May 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-15 04:15

Updated : 2025-01-23 20:15


NVD link : CVE-2023-32758

Mitre link : CVE-2023-32758


JSON object : View

Products Affected

semgrep

  • semgrep

coala

  • git-url-parse
CWE
CWE-1333

Inefficient Regular Expression Complexity