CVE-2021-33503

An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
pythonurllib3
1.25.4 ≤
𝑥
< 1.26.5
oracleenterprise_manager_ops_center
12.4.0.0
oracleinstantis_enterprisetrack
17.1
oracleinstantis_enterprisetrack
17.2
oracleinstantis_enterprisetrack
17.3
oraclezfs_storage_appliance_kit
8.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-urllib3
bullseye
1.26.5-1~exp1
fixed
buster
not-affected
stretch
not-affected
bookworm
1.26.12-1
fixed
sid
2.0.7-2
fixed
trixie
2.0.7-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-pip
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
ignored
groovy
ignored
focal
Fixed 20.0.2-5ubuntu1.7
released
bionic
not-affected
xenial
not-affected
trusty
not-affected
python-urllib3
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
ignored
groovy
ignored
focal
Fixed 1.25.8-2ubuntu0.2
released
bionic
not-affected
xenial
not-affected
trusty
not-affected