PyPi: Smtpdfix

CVE-2020-36242

Transitive

Safety vulnerability ID: 59371

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Feb 07, 2021 Updated at Apr 21, 2024
Scan your Python projects for vulnerabilities →

Advisory

Smtpdfix 0.2.9 requires cryptography version 3.4.4 to include a security fix.

Affected package

smtpdfix

Latest version: 0.5.2

A SMTP server for use as a pytest fixture that implements encryption and authentication for testing.

Affected versions

Fixed versions

Vulnerability changelog

Updates to use the latest release of `aiosmtpd` and to automatically load as a plugin with `pytest`.

- Adds an `SMTPDFix` class for use in `with` blocks.
- The fixture now automatically loads as a plugin with pytest.
- Aiosmtpd version 1.2.4 or greater now required.
- Command responses now standard with aiosmtpd with the exception of AUTH mechanisms.
- Prefers StartTLS to TLS/SSL to avoid a case where if both where specified the SMTP server would report a fault.
- Minor performance enhancements from removing the lazy object proxy and setting key size to 2048 bits instead of 4096.
- Allows for late changes to StartTLS environment variables.

**Version yanked from pypi because it allowed for insecure versions of cryptography to be used.**

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.1

CVSS v3 Details

CRITICAL 9.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 6.4
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
PARTIAL