CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
75.4%
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x
through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses
email addresses that contain multiple @ characters. An application that
uses the email module and implements some kind of checks on the From/To
headers of a message could be tricked into accepting an email address that
should be denied. An attack may be the same as in CVE-2019-11340; however,
this CVE applies to Python more generally.
Author | Note |
---|---|
seth-arnold | This has a very high risk of regression. Email addresses should not be validated beyond making sure there’s at least one byte on both sides of an ‘@’ sign. Legal email addresses are significantly more complicated than what is easy to express in regex. Whatever validation this module provides is in my opinion suspect. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | python2.7 | < 2.7.15-4ubuntu4~18.04.2 | UNKNOWN |
ubuntu | 19.04 | noarch | python2.7 | < 2.7.16-2ubuntu0.2 | UNKNOWN |
ubuntu | 14.04 | noarch | python2.7 | < 2.7.6-8ubuntu0.6+esm3 | UNKNOWN |
ubuntu | 16.04 | noarch | python2.7 | < 2.7.12-1ubuntu0~16.04.9 | UNKNOWN |
ubuntu | 14.04 | noarch | python3.4 | < 3.4.3-1ubuntu1~14.04.7+esm4 | UNKNOWN |
ubuntu | 14.04 | noarch | python3.5 | < 3.5.2-2ubuntu0~16.04.4~14.04.1+esm1 | UNKNOWN |
ubuntu | 16.04 | noarch | python3.5 | < 3.5.2-2ubuntu0~16.04.9 | UNKNOWN |
ubuntu | 18.04 | noarch | python3.6 | < 3.6.8-1~18.04.3 | UNKNOWN |
ubuntu | 19.04 | noarch | python3.7 | < 3.7.3-2ubuntu0.2 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
75.4%