Search for vulnerabilities
Vulnerability details: VCID-ve93-p9d1-aaak
Vulnerability ID VCID-ve93-p9d1-aaak
Aliases CVE-2020-29651
GHSA-hj5v-574p-mj7c
PYSEC-2020-92
Summary A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29651.html
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29651.json
epss 0.00349 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00463 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.00848 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
epss 0.1098 https://api.first.org/data/v1/epss?cve=CVE-2020-29651
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1906451
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29651
cvssv3.1 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-hj5v-574p-mj7c
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/py/PYSEC-2020-92.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/py/PYSEC-2020-92.yaml
cvssv3.1 7.5 https://github.com/pytest-dev/py
generic_textual HIGH https://github.com/pytest-dev/py
cvssv3.1 7.5 https://github.com/pytest-dev/py/issues/256
generic_textual HIGH https://github.com/pytest-dev/py/issues/256
cvssv3.1 7.5 https://github.com/pytest-dev/py/pull/257
generic_textual HIGH https://github.com/pytest-dev/py/pull/257
cvssv3.1 7.5 https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
generic_textual HIGH https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2020-29651
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-29651
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-29651
archlinux Low https://security.archlinux.org/AVG-1338
generic_textual Medium https://ubuntu.com/security/notices/USN-5138-1
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-29651.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29651.json
https://api.first.org/data/v1/epss?cve=CVE-2020-29651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29651
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/py/PYSEC-2020-92.yaml
https://github.com/pytest-dev/py
https://github.com/pytest-dev/py/issues/256
https://github.com/pytest-dev/py/pull/257
https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/
https://ubuntu.com/security/notices/USN-5138-1
https://www.oracle.com/security-alerts/cpujul2022.html
1906451 https://bugzilla.redhat.com/show_bug.cgi?id=1906451
AVG-1338 https://security.archlinux.org/AVG-1338
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:a:pytest:py:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pytest:py:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2020-29651 https://nvd.nist.gov/vuln/detail/CVE-2020-29651
GHSA-hj5v-574p-mj7c https://github.com/advisories/GHSA-hj5v-574p-mj7c
USN-5138-1 https://usn.ubuntu.com/5138-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29651.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/py/PYSEC-2020-92.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pytest-dev/py
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pytest-dev/py/issues/256
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pytest-dev/py/pull/257
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-29651
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-29651
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-29651
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.72316
EPSS Score 0.00349
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.