First published: Fri Apr 19 2019(Updated: )
util/emailutils.py in Matrix Sydent before 1.0.2 mishandles registration restrictions that are based on e-mail domain, if the allowed_local_3pids option is enabled. This occurs because of potentially unwanted behavior in Python, in which an email.utils.parseaddr call on user@bad.example.net@good.example.com returns the user@bad.example.net substring.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Sydent | <1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11340 is a vulnerability in Matrix Sydent before version 1.0.2 that mishandles registration restrictions based on e-mail domain, if the allowed_local_3pids option is enabled.
The vulnerability occurs due to potentially unwanted behavior in Python, where an email.utils.parseaddr call on user@bad.example.net@good.example.net results in mishandling of registration restrictions.
The severity of CVE-2019-11340 is medium with a CVSS score of 5.9.
To fix CVE-2019-11340, upgrade Matrix Sydent to version 1.0.2 or above.
You can find more information about CVE-2019-11340 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-11340), [GitHub Commit](https://github.com/matrix-org/sydent/commit/4e1cfff53429c49c87d5c457a18ed435520044fc), [GitHub Compare](https://github.com/matrix-org/sydent/compare/7c002cd...09278fb).