logo

CVE-2023-27582 github.com/foxcpp/maddy

Package

Manager: go
Name: github.com/foxcpp/maddy
Vulnerable Version: >=0.2.0 <0.6.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00134 pctl0.33821

Details

Full authentication bypass if SASL authorization username is specified ### Impact maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username. ### Patches maddy 0.6.3 includes the fix for the bug. ### Workarounds There is no way to fix the issue without upgrading. ### References * Commit that introduced the vulnerable code: https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a * Fix: https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c

Metadata

Created: 2023-03-14T18:03:22Z
Modified: 2023-03-14T18:03:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-4g76-w3xw-2x6w/GHSA-4g76-w3xw-2x6w.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-4g76-w3xw-2x6w
Finding: F006
Auto approve: 1