CVE-2021-33503

NameCVE-2021-33503
DescriptionAn issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs989848

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-urllib3 (PTS)stretch1.19.1-1vulnerable
stretch (security)1.19.1-1+deb9u1vulnerable
buster1.24.1-1vulnerable
bookworm, sid, bullseye1.26.5-1~exp1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-urllib3source(unstable)1.26.5-1~exp1989848

Notes

[buster] - python-urllib3 <no-dsa> (Minor issue)
[stretch] - python-urllib3 <ignored> (Intrusive to backport)
https://github.com/advisories/GHSA-q2q7-5pp4-w6pg
https://github.com/urllib3/urllib3/commit/2d4a3fee6de2fa45eb82169361918f759269b4ec

Search for package or bug name: Reporting problems