Acceptance of Extraneous Untrusted Data With Trusted Data Affecting aiosmtpd package, versions [,1.4.6)
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-AIOSMTPD-6913431
- published 19 May 2024
- disclosed 18 May 2024
- credit Arusekk
Introduced: 18 May 2024
CVE-2024-34083 Open this link in a new tabHow to fix?
Upgrade aiosmtpd
to version 1.4.6 or higher.
Overview
aiosmtpd is an aiosmtpd - asyncio based SMTP server
Affected versions of this package are vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data via the STARTTLS
process. An attacker can inject unencrypted commands by performing a man-in-the-middle attack.
References
CVSS Scores
version 3.1