Vulnerability Description
sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sqlparse Project | Sqlparse | >= 0.4.0, < 0.4.2 |
Related Weaknesses (CWE)
References
- https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c006PatchThird Party Advisory
- https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhfThird Party Advisory
- https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c006PatchThird Party Advisory
- https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhfThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/12/msg00022.html
FAQ
What is CVE-2021-32839?
CVE-2021-32839 is a vulnerability with a CVSS score of 7.5 (HIGH). sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may ca...
How severe is CVE-2021-32839?
CVE-2021-32839 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32839?
Check the references section above for vendor advisories and patch information. Affected products include: Sqlparse Project Sqlparse.