Lucene search

K
nvd[email protected]NVD:CVE-2023-27582
HistoryMar 13, 2023 - 10:15 p.m.

CVE-2023-27582

2023-03-1322:15:12
CWE-305
CWE-287
web.nvd.nist.gov
2
maddy
mail server
authentication bypass
vulnerability
fix
version 0.6.3

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

56.4%

maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.

Affected configurations

Nvd
Node
maddy_projectmaddyRange0.2.00.6.3
VendorProductVersionCPE
maddy_projectmaddy*cpe:2.3:a:maddy_project:maddy:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

56.4%

Related for NVD:CVE-2023-27582