CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

Open
LOW (2.8)
  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 2.45

  • T

    Tim Bastin fixed CVE-2023-27043

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 2.45

  • logo

    System updated the risk assessment to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment to 2.45

    System recalculated raw risk assessment

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 2.45

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 2.45

  • logo

    System updated the risk assessment to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment to 1.22

    System recalculated raw risk assessment

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 0.81

  • logo

    System updated the risk assessment from 1.22 to 0.61

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 0.81 to 0.61

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 0.61 to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.22 to 2.45

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 0.61 to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.22 to 2.45

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.22 to 2.45

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.45 to 1.22

    System recalculated raw risk assessment

  • logo

    System

  • logo

    System fixed CVE-2023-27043

  • logo

    System

  • logo

    System detected CVE-2023-27043 with a risk of 1.22

  • logo

    System

  • logo

    System

  • logo

    System fixed CVE-2023-27043

  • logo

    System

  • logo

    System detected CVE-2023-27043 with a risk of 1.22

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 1.22

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 1.22

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 1.22

  • T

    Tim Bastin detected CVE-2023-27043 with a risk of 1.22

  • logo

    System updated the risk assessment from 2.45 to 1.22

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.22 to 2.45

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.45 to 1.22

    System recalculated raw risk assessment

  • T

    Tim Bastin fixed CVE-2023-27043

  • logo

    System updated the risk assessment from 1.22 to 2.45

    System recalculated raw risk assessment

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2.45 to 2.8

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2.45 to 2.8

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 2.45 to 2.8

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • S

    Sebastian Kawelke updated the risk assessment from 1.22 to 1.4

    Confidentiality Requirement updated: medium -> low, Integrity Requirement updated: medium -> high, Availability Requirement updated: medium -> high

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.8 to 1.4

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 2.8 to 1.4

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System fixed CVE-2023-27043

  • logo

    System detected CVE-2023-27043 with a risk of 1.4

  • logo

    System updated the risk assessment from 1.4 to 2.8

    System recalculated raw risk assessment

Add a comment

Mark as False Positive
Last calculated at:

Affected component

debian/python3.11

Installed version:
3.11.2-6
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 2ab7b793efd72421aea8c3a994ac60202bf1b3a5