Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-27582
HistoryMar 13, 2023 - 9:40 p.m.

CVE-2023-27582 Full authentication bypass if SASL authorization username is specified

2023-03-1321:40:23
CWE-287
CWE-305
GitHub_M
www.cve.org
4
authentication bypass
maddy mail server
sasl authorization
plain mechanism
version 0.2.0
version 0.6.3
credential validation
bug fix

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

10

Confidence

High

EPSS

0.002

Percentile

56.4%

maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "foxcpp",
    "product": "maddy",
    "versions": [
      {
        "version": ">= 0.2.0  0.6.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

10

Confidence

High

EPSS

0.002

Percentile

56.4%

Related for CVELIST:CVE-2023-27582