CVE-2024-34083
STARTTLS unencrypted commands injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
aiosmptd is a reimplementation of the Python stdlib smtpd.py based on asyncio. Prior to version 1.4.6, servers based on aiosmtpd accept extra unencrypted commands after STARTTLS, treating them as if they came from inside the encrypted connection. This could be exploited by a man-in-the-middle attack. Version 1.4.6 contains a patch for the issue.
aiosmptd es una reimplementación de Python stdlib smtpd.py basada en asyncio. Antes de la versión 1.4.6, los servidores basados en aiosmtpd aceptaban comandos adicionales no cifrados después de STARTTLS, tratándolos como si provinieran del interior de la conexión cifrada. Esto podría aprovecharse mediante un man in the middle. La versión 1.4.6 contiene un parche para el problema.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-30 CVE Reserved
- 2024-05-18 CVE Published
- 2024-05-19 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/aio-libs/aiosmtpd/commit/b3a4a2c6ecfd228856a20d637dc383541fcdbfda | X_refsource_misc | |
https://github.com/aio-libs/aiosmtpd/security/advisories/GHSA-wgjv-9j3q-jhg8 | X_refsource_confirm | |
https://nostarttls.secvuln.info | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|