-
Notifications
You must be signed in to change notification settings - Fork 248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Python] CWE-400: Regular Expression Injection #318
Comments
Your submission is now in status SecLab review. For information, the evaluation workflow is the following: |
Polished a bit the description after the detail change related to Regular Expression Injection. |
Hello Jorge, the security lab is evaluating your submission, we will ping you back soon. Thanks for the submission |
Your submission is now in status CodeQL review. For information, the evaluation workflow is the following: |
Your submission is now in status SecLab finalize. For information, the evaluation workflow is the following: |
Created Hackerone report 1196124 for bounty 303883 : [318] [Python] CWE-400: Regular Expression Injection |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query
Relevant PR: github/codeql#5442
Report
Constructing regular expressions directly from tainted data enables attackers to craft regular expressions in order to cause a Denial of Service or change the behaviour of the application depending on the matched string.
This query identifies cases in which a regular expression is used without being escaped before by
re.escape
(see python re documentation).Result(s)
The text was updated successfully, but these errors were encountered: