CVE-2021-33503

NameCVE-2021-33503
DescriptionAn issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs989848

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-urllib3 (PTS)buster1.24.1-1fixed
buster (security)1.24.1-1+deb10u2fixed
bullseye1.26.5-1~exp1fixed
bookworm1.26.12-1fixed
sid, trixie1.26.18-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-urllib3sourcestretch(not affected)
python-urllib3sourcebuster(not affected)
python-urllib3source(unstable)1.26.5-1~exp1989848

Notes

[buster] - python-urllib3 <not-affected> (Vulnerable code introduced later)
[stretch] - python-urllib3 <not-affected> (Vulnerable code introduced later)
https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
Introduced around: https://github.com/urllib3/urllib3/commit/5b047b645f5f93900d5e2fc31230848c25eb1f5f (1.25.4)
Fixed by: https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec (1.26.5)

Search for package or bug name: Reporting problems