{"id":"BIT-setuptools-2022-40897","details":"Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.","aliases":["CVE-2022-40897","GHSA-r9hx-vwmv-q579","PYSEC-2022-43012"],"modified":"2026-03-11T07:46:27.997768Z","published":"2024-03-06T11:04:50.199Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:python:setuptools:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200"},{"type":"WEB","url":"https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be"},{"type":"WEB","url":"https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/"},{"type":"WEB","url":"https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"},{"type":"WEB","url":"https://pyup.io/vulnerabilities/CVE-2022-40897/52495/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20230214-0001/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240621-0006/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40897"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html"}],"affected":[{"package":{"name":"setuptools","ecosystem":"Bitnami","purl":"pkg:bitnami/setuptools"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"65.5.1"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/setuptools/BIT-setuptools-2022-40897.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.5"}