Recursion Error in Python Legacy Email Parsing Function
CVE-2023-36632

7.5HIGH

Key Information:

Vendor

Python

Status
Vendor
CVE Published:
25 June 2023

What is CVE-2023-36632?

The email.utils.parseaddr function in the Python Standard Library, specifically in versions up to 3.11.4, can be exploited by attackers using crafted input data. This input, which should contain a name and an email address, can lead to a 'RecursionError' as it exceeds the maximum recursion depth. Although this function is categorized as a legacy API, it highlights the importance of input validation in applications to avoid excessive recursion, which is not a defined vulnerability according to the vendor. The recommended practice is to utilize the newer email.parser.BytesParser or email.parser.Parser classes for safer email data handling.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-36632 : Recursion Error in Python Legacy Email Parsing Function