Skip to content

Incomplete regular expression for feed URL parsing

Low
tecnobabble published GHSA-wrh4-vj89-98wr Aug 19, 2020

Package

vulnfeed_2_tenb

Affected versions

<= v1.1.3

Patched versions

1.1.4

Description

Impact

Two specific feed URLs are parsed to pull out alert details and there was insufficient input validation on the URLs being passed. Limited impact as the feeds themselves would have to be altered for this to have any sort of an impact, and it would likely just lead to a lack of CVE detection.

Patches

Fixed in latest and v1.1.4

Workarounds

Manually edit vulnfeed_2_tenb.py and escape the '.' in the CERT and ICS-CERT url parsers.

References

Incomplete regular expression for hostnames
Common Weakness Enumeration: CWE-20.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs