Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-33185
HistoryMay 26, 2023 - 8:03 p.m.

CVE-2023-33185 Incorrect signature verification in django-ses

2023-05-2620:03:33
CWE-347
GitHub_M
www.cve.org
flawed signature verification
django-ses
aws ses

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

29.1%

Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the SESEventWebhookView class intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates. This issue was patched in version 3.5.0.

CNA Affected

[
  {
    "vendor": "django-ses",
    "product": "django-ses",
    "versions": [
      {
        "version": "< 3.5.0",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

29.1%

Related for CVELIST:CVE-2023-33185