{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3733","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-11-03T21:45:06.299Z","dateReserved":"2021-08-23T00:00:00.000Z","datePublished":"2022-03-07T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-06-30T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability."}],"affected":[{"vendor":"n/a","product":"python","versions":[{"version":"Fixed in python v3.6.14, python v3.7.11, python v3.8.10, python v3.9.5.","status":"affected"}]}],"references":[{"url":"https://bugs.python.org/issue43075"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995234"},{"url":"https://github.com/python/cpython/pull/24391"},{"url":"https://ubuntu.com/security/CVE-2021-3733"},{"url":"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb"},{"url":"https://security.netapp.com/advisory/ntap-20220407-0001/"},{"name":"[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html"},{"name":"[debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 - Uncontrolled Resource Consumption","cweId":"CWE-400"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://bugs.python.org/issue43075","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1995234","tags":["x_transferred"]},{"url":"https://github.com/python/cpython/pull/24391","tags":["x_transferred"]},{"url":"https://ubuntu.com/security/CVE-2021-3733","tags":["x_transferred"]},{"url":"https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20220407-0001/","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html"},{"name":"[debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:45:06.299Z"}}]}}