7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.4 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
50.6%
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 19.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 12.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
fedora | eq | 29 | |
fedora | eq | 30 | |
fedora | eq | 31 |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html
lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
access.redhat.com/errata/RHSA-2019:3725
access.redhat.com/errata/RHSA-2019:3948
bugs.python.org/issue34155
github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9
lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2019/09/msg00018.html
lists.debian.org/debian-lts-announce/2019/09/msg00019.html
lists.debian.org/debian-lts-announce/2020/07/msg00011.html
lists.debian.org/debian-lts-announce/2020/08/msg00034.html
lists.fedoraproject.org/archives/list/[email protected]/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
lists.fedoraproject.org/archives/list/[email protected]/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/
lists.fedoraproject.org/archives/list/[email protected]/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/
lists.fedoraproject.org/archives/list/[email protected]/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
lists.fedoraproject.org/archives/list/[email protected]/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
lists.fedoraproject.org/archives/list/[email protected]/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
lists.fedoraproject.org/archives/list/[email protected]/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/
lists.fedoraproject.org/archives/list/[email protected]/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/
lists.fedoraproject.org/archives/list/[email protected]/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
lists.fedoraproject.org/archives/list/[email protected]/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
lists.fedoraproject.org/archives/list/[email protected]/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/
lists.fedoraproject.org/archives/list/[email protected]/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/
lists.fedoraproject.org/archives/list/[email protected]/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/
lists.fedoraproject.org/archives/list/[email protected]/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/
lists.fedoraproject.org/archives/list/[email protected]/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/
security.netapp.com/advisory/ntap-20190926-0005/
usn.ubuntu.com/4151-1/
usn.ubuntu.com/4151-2/
www.oracle.com/security-alerts/cpuapr2020.html
www.oracle.com/security-alerts/cpujul2020.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.4 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
50.6%