Lucene search

K
githubGitHub Advisory DatabaseGHSA-4G76-W3XW-2X6W
HistoryMar 14, 2023 - 6:03 p.m.

Full authentication bypass if SASL authorization username is specified

2023-03-1418:03:22
CWE-287
GitHub Advisory Database
github.com
13
maddy
authentication bypass
sasl authorization
plain
upgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.4%

Impact

maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username.

Patches

maddy 0.6.3 includes the fix for the bug.

Workarounds

There is no way to fix the issue without upgrading.

References

Affected configurations

Vulners
Node
foxcppmaddyRange0.2.00.6.3
VendorProductVersionCPE
foxcppmaddy*cpe:2.3:a:foxcpp:maddy:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

56.4%

Related for GHSA-4G76-W3XW-2X6W