The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-42969

CVE-2022-42969: Pytest Py Library DOS Vulnerability

CVE-2022-42969 is a ReDoS denial of service vulnerability in the py library for Python that affects Subversion repository handling. This article covers the technical details, affected versions, and mitigation steps.

Published: February 18, 2026

CVE-2022-42969 Overview

CVE-2022-42969 is a Regular expression Denial of Service (ReDoS) vulnerability affecting the py library through version 1.11.0 for Python. The vulnerability allows remote attackers to conduct a ReDoS attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.

Important Note: This vulnerability has been disputed by multiple third parties as not being reproducible, and they argue this is not a valid vulnerability. Organizations should evaluate this CVE in the context of their specific usage of the py library.

Critical Impact

Potential denial of service through CPU exhaustion when processing maliciously crafted Subversion repository information, though reproducibility has been disputed.

Affected Products

  • pytest py library through version 1.11.0

Discovery Timeline

  • 2022-10-16 - CVE CVE-2022-42969 published to NVD
  • 2025-05-14 - Last updated in NVD database

Technical Details for CVE-2022-42969

Vulnerability Analysis

This vulnerability falls under CWE-1333 (Inefficient Regular Expression Complexity), commonly known as a ReDoS (Regular expression Denial of Service) vulnerability. The issue exists within the Subversion URL path handling functionality of the py library.

When the py library processes information from a Subversion repository, the InfoSvnCommand argument handling involves regular expression operations that can exhibit catastrophic backtracking behavior when given specially crafted input. This could allow an attacker to cause excessive CPU consumption, leading to a denial of service condition.

The vulnerable code is located in the svnurl.py file within the py/_path/ directory, specifically in the SVN information processing logic. However, it should be noted that multiple security researchers and third parties have disputed whether this vulnerability is actually reproducible in practice.

Root Cause

The root cause of this vulnerability stems from the use of an inefficient regular expression pattern in the SVN URL processing code. When processing Subversion repository information, the regex pattern used can enter a state of catastrophic backtracking when supplied with maliciously crafted input strings.

Catastrophic backtracking occurs when a regex engine attempts to match a pattern against an input string and must explore an exponentially growing number of possible paths, consuming significant CPU resources in the process.

Attack Vector

The attack vector is network-based and does not require authentication. An attacker could exploit this vulnerability by:

  1. Creating or controlling a malicious Subversion repository
  2. Crafting the repository's info data with specially designed strings that trigger catastrophic regex backtracking
  3. Inducing a victim application using the py library to process this malicious repository information

This could be achieved if an application uses the py library to interact with untrusted or attacker-controlled Subversion repositories. The attack does not require user interaction and could potentially be triggered automatically depending on how the vulnerable library is used.

The vulnerability is documented in the GitHub Issue #287 and the relevant code can be examined in the GitHub Code Repository.

Detection Methods for CVE-2022-42969

Indicators of Compromise

  • Unusual CPU spikes when processing Subversion repository operations
  • Application hangs or timeouts during SVN-related operations
  • Process resource exhaustion in applications using the py library
  • Repeated slow responses from services that interact with Subversion repositories

Detection Strategies

  • Monitor for abnormal CPU utilization patterns in Python processes using the py library
  • Implement application performance monitoring (APM) to detect regex-related CPU exhaustion
  • Use software composition analysis (SCA) tools to identify installations of py library version 1.11.0 or earlier
  • Review application logs for timeout errors related to Subversion operations

Monitoring Recommendations

  • Deploy runtime application monitoring to detect extended regex processing times
  • Configure alerting thresholds for CPU usage anomalies in applications utilizing SVN functionality
  • Implement dependency scanning in CI/CD pipelines to identify vulnerable py library versions
  • Monitor network traffic patterns for unusual interactions with Subversion repositories

How to Mitigate CVE-2022-42969

Immediate Actions Required

  • Audit your Python applications to determine if they use the py library for Subversion operations
  • Evaluate whether your applications process untrusted Subversion repository data
  • If the py library is only used as a transitive dependency and SVN functionality is not utilized, the risk may be minimal
  • Consider implementing input validation and timeout controls for SVN operations

Patch Information

As of the last modification date, the py library maintainers have not released a specific patch addressing this vulnerability. The PyPI Package Listing should be monitored for any future updates. Given the disputed nature of this vulnerability, organizations should evaluate the actual risk based on their specific use case.

Additional context about the validity of this vulnerability can be found in the Hacker News Discussion.

Workarounds

  • Implement timeout mechanisms for any regex operations involving external SVN data
  • Avoid processing Subversion repository information from untrusted sources
  • Consider using alternative libraries for SVN operations if available
  • Apply network-level controls to restrict access to untrusted Subversion repositories
  • Implement resource limits (CPU/memory) for processes that handle SVN data
bash
# Example: Check if py library is installed and its version
pip show py

# If vulnerable, consider pinning or monitoring for updates
pip list | grep -i "^py "

# Review dependencies that may include py as a transitive dependency
pip show py | grep "Required-by"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechPytest

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.12%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-1333
  • Technical References
  • GitHub Code Repository

  • GitHub Issue #287

  • Hacker News Discussion

  • PyPI Package Listing
  • Related CVEs
  • CVE-2020-29651: Pytest Py DOS Vulnerability

  • CVE-2025-71176: pytest Privilege Escalation Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English