发布时间: 2024年11月8日
修改时间: 2024年11月15日
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
NVD | openEuler | |
---|---|---|
CVSS评分 | 5.3 | 5.3 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | None | None |
Integrity | Low | Low |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4215 | python3 security update | 2024年11月15日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.2 | python3 | Fixed |
V6 | python3 | Fixed |