Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6cp7-g972-w9m9

Опубликовано: 07 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server

Impact

Any configuration on any maddy version <0.5.4 using auth.pam is affected.

No password expiry or account expiry checking is done when authenticating using PAM.

Patches

Patch is available as part of the 0.5.4 release.

Workarounds

If /etc/shadow authentication is used, it is possible to replace auth.pam with auth.shadow which is not affected.

It is possible to blacklist expired accounts via existing filtering mechanisms (e.g. auth_map to invalid accounts in storage.imapsql).

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/foxcpp/maddy

go
Затронутые версииВерсия исправления

< 0.5.4

0.5.4

EPSS

Процентиль: 33%
0.00133
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-324
CWE-613

Связанные уязвимости

CVSS3: 6.3
nvd
почти 4 года назад

Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.

EPSS

Процентиль: 33%
0.00133
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-324
CWE-613