Lucene search

K
nvd[email protected]NVD:CVE-2023-36632
HistoryJun 25, 2023 - 6:15 p.m.

CVE-2023-36632

2023-06-2518:15:09
CWE-674
web.nvd.nist.gov
6
python
recursionerror
email.utils.parseaddr

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

47.0%

The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger “RecursionError: maximum recursion depth exceeded while calling a Python object” via a crafted argument. This argument is plausibly an untrusted value from an application’s input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor’s perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.

Affected configurations

Nvd
Node
pythonpythonRange3.11.4
VendorProductVersionCPE
pythonpython*cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

47.0%