bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 | Exploit Issue Tracking |
https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2023-02-16T00:00:00
Updated: 2023-02-16T00:00:00
Reserved: 2020-01-10T00:00:00
Link: CVE-2020-6817
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-02-16T22:15:10.650
Modified: 2023-02-28T14:46:27.910
Link: CVE-2020-6817
JSON object: View
Redhat Information
No data.
CWE