-
Notifications
You must be signed in to change notification settings - Fork 2
/
PSF-2023-4.json
30 lines (30 loc) · 1.26 KB
/
PSF-2023-4.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
{
"modified": "2023-08-28T16:57:11Z",
"published": "2023-06-25T00:00:00Z",
"schema_version": "1.5.0",
"id": "PSF-2023-4",
"aliases": [
"CVE-2023-36632"
],
"details": "The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger \"RecursionError: maximum recursion depth exceeded while calling a Python object\" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.",
"affected": [
{
"ranges": [
{
"type": "GIT",
"events": [
{
"introduced": "0"
}
],
"repo": "https://github.com/python/cpython"
}
]
}
],
"database_specific": {
"cwe_ids": [
"CWE-674"
]
}
}