CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
58.7%
python is vulnerable to improper input validation. The vulnerability arises due to incorrect parsing of an email address containing a special character. An attacker can bypass protection mechanisms in which application access is granted only after verifying its domain name.
Vendor | Product | Version | CPE |
---|---|---|---|
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.8.8-r0:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.9.5-r1:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.10.2-r0:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.11.1-r2:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.8.2-r1:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.11.1-r1:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.8.2-r7:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.10.5-r1:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.10.4-r0:*:*:*:*:*:*:* |
- | python3\ | edge | cpe:2.3:a:-:python3\:edge:3.12.3-r0:*:*:*:*:*:*:* |
python.org
github.com/python/cpython/commit/30870c834ce0e47cc689b56aed7ac468f6e1c1ad#diff-3157f826e3eb7c130240837577bdc770f926762b7181ea6f72b40691918de8a1
github.com/python/cpython/issues/102988
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
python-security.readthedocs.io/vuln/email-parseaddr-realname.html
security.netapp.com/advisory/ntap-20230601-0003/