CVE-2023-27043

Public on 2023-04-19
Modified on 2024-03-01
Description
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Severity
Medium severity
Medium
CVSS v3 Base Score
5.3
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core python 2024-10-24 ALAS2-2024-2686 Fixed
Amazon Linux 1 python27 Pending Fix
Amazon Linux 2 - Core python3 2024-10-24 ALAS2-2024-2687 Fixed
Amazon Linux 2023 python3.11 2023-07-17 ALAS2023-2023-252 Fixed
Amazon Linux 2023 python3.9 Pending Fix
Amazon Linux 1 python38 Pending Fix
Amazon Linux 2 - Python3.8 Extra python38 2024-10-24 ALAS2PYTHON3.8-2024-014 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
NVD CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N