Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-1892
HistoryFeb 28, 2024 - 12:00 a.m.

CVE-2024-1892

2024-02-2800:00:00
ubuntu.com
ubuntu.com
35
vulnerability
scrapy api
redos
high cpu
memory usage
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.0%

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the
XMLFeedSpider class of the scrapy/scrapy project, specifically in the
parsing of XML content. By crafting malicious XML content that exploits
inefficient regular expression complexity used in the parsing process, an
attacker can cause a denial-of-service (DoS) condition. This vulnerability
allows for the system to hang and consume significant resources,
potentially rendering services that utilize Scrapy for XML processing
unresponsive.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.0%