Skip to content

[Python] CWE-400: Regular Expression Injection #318

@jorgectf

Description

@jorgectf

Query

Relevant PR: github/codeql#5442

Report

Constructing regular expressions directly from tainted data enables attackers to craft regular expressions in order to cause a Denial of Service or change the behaviour of the application depending on the matched string.

This query identifies cases in which a regular expression is used without being escaped before by re.escape (see python re documentation).

  • Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc). We would love to have you spread the word about the good work you are doing

Result(s)

Metadata

Metadata

Assignees

Labels

All For OneSubmissions to the All for One, One for All bounty

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions