Description
mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
Problem types
CWE-1333 Inefficient Regular Expression Complexity
Product status
References
securitylab.github.com/...21-108-python-mechanize-mechanize/
github.com/...a417dd46b53832ae3b5/mechanize/_urllib2_fork.py
github.com/python-mechanize/mechanize/releases/tag/v0.4.6
github.com/...ommit/dd05334448e9f39814bab044d2eaa5ef69b410d6
lists.debian.org/debian-lts-announce/2023/06/msg00022.html ([debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update)
lists.debian.org/debian-lts-announce/2025/12/msg00028.html
securitylab.github.com/...21-108-python-mechanize-mechanize/
github.com/...a417dd46b53832ae3b5/mechanize/_urllib2_fork.py
github.com/python-mechanize/mechanize/releases/tag/v0.4.6
github.com/...ommit/dd05334448e9f39814bab044d2eaa5ef69b410d6
lists.debian.org/debian-lts-announce/2023/06/msg00022.html ([debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.