Lucene search

K
cveGitHub_MCVE-2023-27582
HistoryMar 13, 2023 - 10:15 p.m.

CVE-2023-27582

2023-03-1322:15:12
CWE-305
CWE-287
GitHub_M
web.nvd.nist.gov
19
maddy
mail server
cve-2023-27582
authentication bypass
security vulnerability
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

56.4%

maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.

Affected configurations

Nvd
Vulners
Node
maddy_projectmaddyRange0.2.00.6.3
VendorProductVersionCPE
maddy_projectmaddy*cpe:2.3:a:maddy_project:maddy:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "foxcpp",
    "product": "maddy",
    "versions": [
      {
        "version": ">= 0.2.0  0.6.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.002

Percentile

56.4%

Related for CVE-2023-27582