Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4g76-w3xw-2x6w

Опубликовано: 14 мар. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

Full authentication bypass if SASL authorization username is specified

Impact

maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username.

Patches

maddy 0.6.3 includes the fix for the bug.

Workarounds

There is no way to fix the issue without upgrading.

References

Пакеты

Наименование

github.com/foxcpp/maddy

go
Затронутые версииВерсия исправления

>= 0.2.0, < 0.6.3

0.6.3

EPSS

Процентиль: 34%
0.00138
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 9.1
nvd
почти 3 года назад

maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.

EPSS

Процентиль: 34%
0.00138
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-287