Vulnerability Description
util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on [email protected]@good.example.com returns the [email protected] substring.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Matrix | Sydent | < 1.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed4355200PatchThird Party Advisory
- https://github.com/matrix-org/sydent/compare/7c002cd...09278fbPatchThird Party Advisory
- https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2/Release NotesVendor Advisory
- https://twitter.com/matrixdotorg/status/1118934335963500545Third Party Advisory
- https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed4355200PatchThird Party Advisory
- https://github.com/matrix-org/sydent/compare/7c002cd...09278fbPatchThird Party Advisory
- https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2/Release NotesVendor Advisory
- https://twitter.com/matrixdotorg/status/1118934335963500545Third Party Advisory
FAQ
What is CVE-2019-11340?
CVE-2019-11340 is a vulnerability with a CVSS score of 5.9 (MEDIUM). util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially ...
How severe is CVE-2019-11340?
CVE-2019-11340 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11340?
Check the references section above for vendor advisories and patch information. Affected products include: Matrix Sydent.