CVE-2019-11340
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring.
Vulnerabilidad en archivo util/emailutils.py en Matrix Sydent anterior a las restricciones de registro de la versión 1.0.2 basado en el dominio de correo electrónico, si la opción allowed_local_3pids está habilitada. Esto ocurre debido a un comportamiento potencialmente no deseado en Python, en el que una llamada de email.utils.parseaddr en user@bad.example.net@good.example.com devuelve la subcadena user@bad.example.net.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-19 CVE Reserved
- 2019-04-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://twitter.com/matrixdotorg/status/1118934335963500545 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed435520044fc | 2019-04-22 | |
https://github.com/matrix-org/sydent/compare/7c002cd...09278fb | 2019-04-22 |
URL | Date | SRC |
---|---|---|
https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2 | 2019-04-22 |