Skip to content

StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)

Critical
andialbrecht published GHSA-p5w8-wqhj-9hhf Sep 10, 2021

Package

python-sqlparse (Python)

Affected versions

0.4.0, 0.4.1

Patched versions

0.4.2

Description

Impact

The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.

Patches

The issues has been fixed in sqlparse 0.4.2.

Workarounds

Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool.

References

This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a CodeQL query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following this link.

For more information

If you have any questions or comments about this advisory:

Severity

Critical

CVE ID

No known CVE

Weaknesses

No CWEs

Credits