• CVE-2023-27043

发布时间: 2024年11月8日

修改时间: 2024年11月15日

概要

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS v3 指标

NVD openEuler
CVSS评分 5.3 5.3
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality None None
Integrity Low Low
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4215 python3 security update 2024年11月15日

影响产品

产品 状态
KY3.5.2 python3 Fixed
V6 python3 Fixed