Executive Summary

Informations
Name CVE-2023-36632 First vendor Publication 2023-06-25
Vendor Cve Last vendor Modification 2024-04-11

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36632

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-674 Uncontrolled Recursion

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 328

Sources (Detail)

Source Url
MISC https://docs.python.org/3/library/email.html
https://docs.python.org/3/library/email.utils.html
https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-em...
https://github.com/python/cpython/issues/103800

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Date Informations
2024-04-11 09:27:58
  • Multiple Updates
2024-03-21 09:28:01
  • Multiple Updates
2024-02-02 02:47:05
  • Multiple Updates
2024-02-01 12:30:33
  • Multiple Updates
2023-12-09 13:34:44
  • Multiple Updates
2023-11-07 21:28:32
  • Multiple Updates
2023-09-05 13:41:39
  • Multiple Updates
2023-09-05 01:29:38
  • Multiple Updates
2023-09-02 13:39:45
  • Multiple Updates
2023-09-02 01:30:04
  • Multiple Updates
2023-08-12 13:44:59
  • Multiple Updates
2023-08-12 01:29:17
  • Multiple Updates
2023-08-11 13:37:05
  • Multiple Updates
2023-08-11 01:30:10
  • Multiple Updates
2023-08-06 13:33:39
  • Multiple Updates
2023-08-06 01:28:55
  • Multiple Updates
2023-08-04 13:34:03
  • Multiple Updates
2023-08-04 01:29:18
  • Multiple Updates
2023-07-14 05:27:36
  • Multiple Updates
2023-07-14 01:28:48
  • Multiple Updates
2023-07-06 21:27:28
  • Multiple Updates
2023-06-29 17:27:16
  • Multiple Updates
2023-06-26 17:27:18
  • Multiple Updates
2023-06-26 00:27:14
  • First insertion