We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Type of Issue Potential Regex Denial of Service (ReDoS)
Description The vulnerable regular expression is located in
sphinx/sphinx/ext/napoleon/docstring.py
Line 34 in 31f26a0
The regex with quantified overlapping adjacency and can be exploited with the following string " " * 5000 + "!"
" " * 5000 + "!"
I think you can limit the input length or modify this regex.
The text was updated successfully, but these errors were encountered:
Thank you for reporting. I posted #8224 to fix this. Please check it if you have time.
Sorry, something went wrong.
Hi @tk0miya , Thank you for your reply. I think your fix is correct and safe :)
f00e752
Merge pull request #8224 from tk0miya/8172_napoleon_redos
a81c453
Fix #8172: napoleon: Potential of regex denial of service in google style docs
No branches or pull requests
Type of Issue
Potential Regex Denial of Service (ReDoS)
Description
The vulnerable regular expression is located in
sphinx/sphinx/ext/napoleon/docstring.py
Line 34 in 31f26a0
The regex with quantified overlapping adjacency and can be exploited with the following string
" " * 5000 + "!"
I think you can limit the input length or modify this regex.
The text was updated successfully, but these errors were encountered: