CVE-2023-27043

Updated: 2025-12-28 04:13:29.515774

Description:

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.3

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

CloudLinux 6 ELS python 2.6.6 5.3 MEDIUM Ignored 2023-04-28 11:04:35 Ignored due to low severity
CloudLinux 7 ELS python 2.7.5 5.3 MEDIUM Released CLSA-2024:1727289167 2024-10-07 10:54:15
CloudLinux 7 ELS python3 3.6.8 5.3 MEDIUM Ignored 2024-09-09 12:12:14
Oracle Linux 6 ELS python 2.6.6 5.3 MEDIUM Ignored 2023-04-28 11:04:35 Ignored due to low severity
Ubuntu 16.04 ELS python3.5 3.5.2 5.3 MEDIUM Released CLSA-2024:1729627400 2024-10-22 18:06:25
Ubuntu 16.04 ELS python2.7 2.7.12 5.3 MEDIUM Released CLSA-2024:1729627193 2024-10-22 18:06:23
Ubuntu 18.04 ELS python2.7 2.7.17-1 5.3 MEDIUM Released CLSA-2024:1730133909 2024-10-28 15:02:06
Ubuntu 18.04 ELS python3.6 3.6.9-1 5.3 MEDIUM Released CLSA-2024:1729628050 2024-10-22 18:06:22
Total: 18