{"id":"CVE-2021-32837","details":"mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.","aliases":["GHSA-g3pv-pj5f-3hfq","PYSEC-2023-25"],"modified":"2026-04-02T06:58:04.372481Z","published":"2023-01-17T22:15:10.533Z","related":["MGASA-2023-0036","openSUSE-SU-2023:0030-1","openSUSE-SU-2024:12621-1","openSUSE-SU-2025:15098-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00022.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/12/msg00028.html"},{"type":"ADVISORY","url":"https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6"},{"type":"FIX","url":"https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6"},{"type":"EVIDENCE","url":"https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/"},{"type":"EVIDENCE","url":"https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/python-mechanize/mechanize","events":[{"introduced":"0"},{"fixed":"18de4ce0265a025efc0f851f8956b40f2d9ed3ba"},{"fixed":"dd05334448e9f39814bab044d2eaa5ef69b410d6"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.4.6"}]}}],"versions":["v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.3.5","v0.3.6","v0.3.7","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.4.4","v0.4.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32837.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}