Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2023-27043
April 18, 2023
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Affected Packages
cpython (CONDA):
Affected version(s)
Fix Suggestion:
Update to version 3.9.20
cpython (CONDA):
Affected version(s)
Fix Suggestion:
Update to version 3.11.10
cpython (CONDA):
Affected version(s)
Fix Suggestion:
Update to version 3.12.6
cpython (CONDA):
Affected version(s)
Fix Suggestion:
Update to version 3.10.15
cpython (CONDA):
Affected version(s)
Fix Suggestion:
Update to version 3.8.20
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.8.0a1 <v3.8.20
Fix Suggestion:
Update to version v3.8.20
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.11.0a1 <v3.11.10
Fix Suggestion:
Update to version v3.11.10
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.13.0a1 <v3.13.0a3
Fix Suggestion:
Update to version v3.13.0a3
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.10.0a1 <v3.10.15
Fix Suggestion:
Update to version v3.10.15
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.12.0a1 <v3.12.6
Fix Suggestion:
Update to version v3.12.6
https://github.com/python/cpython.git (GITHUB):
Affected version(s) >=v3.9.0a2 <v3.9.20
Fix Suggestion:
Update to version v3.9.20
Related ResourcesĀ (49)
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Validation of Syntactic Correctness of Input
Improper Input Validation
EPSS
Base Score:
0.18