{"api_version":"1","generated_at":"2026-04-22T23:09:34+00:00","cve":"CVE-2021-32839","urls":{"html":"https://cve.report/CVE-2021-32839","api":"https://cve.report/api/cve/CVE-2021-32839.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-32839","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-32839"},"summary":{"title":"CVE-2021-32839","description":"sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\\r\\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-09-20 17:15:00","updated_at":"2021-09-29 15:04:00"},"problem_types":["CWE-400"],"metrics":[],"references":[{"url":"https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf","name":"https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf","refsource":"CONFIRM","tags":[],"title":"StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) · Advisory · andialbrecht/sqlparse · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb","name":"https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb","refsource":"MISC","tags":[],"title":"Optimize regular expression for identifying line breaks in comments. · andialbrecht/sqlparse@8238a9e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-32839","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32839","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"32839","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sqlparse_project","cpe5":"sqlparse","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-32839","qid":"184111","title":"Debian Security Update for sqlparse (CVE-2021-32839)"},{"cve":"CVE-2021-32839","qid":"198509","title":"Ubuntu Security Notification for SQL parse Vulnerability (USN-5085-1)"},{"cve":"CVE-2021-32839","qid":"240566","title":"Red Hat Update for Satellite 6.11 Release (RHSA-2022:5498)"},{"cve":"CVE-2021-32839","qid":"501906","title":"Alpine Linux Security Update for py3-sqlparse"},{"cve":"CVE-2021-32839","qid":"751426","title":"OpenSUSE Security Update for python-sqlparse (openSUSE-SU-2021:3857-1)"},{"cve":"CVE-2021-32839","qid":"960505","title":"Rocky Linux Security Update for Satellite (RLSA-2022:5498)"},{"cve":"CVE-2021-32839","qid":"980660","title":"Python (pip) Security Update for sqlparse (GHSA-p5w8-wqhj-9hhf)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-32839","STATE":"PUBLIC","TITLE":"Regular Expression Denial of Service in sqlparse"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"sqlparse","version":{"version_data":[{"version_value":">= 0.4.0, < 0.4.2"}]}}]},"vendor_name":"andialbrecht"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\\r\\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-400 Uncontrolled Resource Consumption"}]}]},"references":{"reference_data":[{"name":"https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf","refsource":"CONFIRM","url":"https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf"},{"name":"https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb","refsource":"MISC","url":"https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb"}]},"source":{"advisory":"GHSA-p5w8-wqhj-9hhf","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-09-20 17:15:00","lastModifiedDate":"2021-09-29 15:04:00","problem_types":["CWE-400"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sqlparse_project:sqlparse:*:*:*:*:*:*:*:*","versionStartIncluding":"0.4.0","versionEndExcluding":"0.4.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"32839","Ordinal":"208227","Title":"CVE-2021-32839","CVE":"CVE-2021-32839","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"32839","Ordinal":"1","NoteData":"sqlparse is a non-validating SQL parser module for Python. In sqlparse versions 0.4.0 and 0.4.1 there is a regular Expression Denial of Service in sqlparse vulnerability. The regular expression may cause exponential backtracking on strings containing many repetitions of '\\r\\n' in SQL comments. Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the sqlformat.format function with keyword strip_comments=True or the --strip-comments command line flag when using the sqlformat command line tool. The issues has been fixed in sqlparse 0.4.2.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"32839","Ordinal":"2","NoteData":"2021-09-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"32839","Ordinal":"3","NoteData":"2021-09-20","Type":"Other","Title":"Modified"}]}}}