{"id":"AZL-35144","summary":"CVE-2023-27043 affecting package python3 3.12.9-9","details":"The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.","modified":"2026-04-01T05:11:56.827155Z","published":"2023-04-19T00:15:07Z","upstream":["CVE-2023-27043"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27043"}],"affected":[{"package":{"name":"python3","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/python3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"3.12.9-9"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-35144.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}