Safety vulnerability ID: 37073
The information on this page was manually curated by our Cybersecurity Intelligence Team.
util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on [email protected]@good.example.com returns the [email protected] substring. See: CVE-2019-11340.
Latest version: 2.6.1
Reference Matrix Identity Verification and Lookup Server
util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on [email protected]@good.example.com returns the [email protected] substring.
MISC:https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed435520044fc: https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed435520044fc
MISC:https://github.com/matrix-org/sydent/compare/7c002cd...09278fb: https://github.com/matrix-org/sydent/compare/7c002cd...09278fb
MISC:https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2/: https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2/
MISC:https://twitter.com/matrixdotorg/status/1118934335963500545: https://twitter.com/matrixdotorg/status/1118934335963500545
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application