Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS00Zzc2LXczeHctMng2d84AAyGN

Full authentication bypass if SASL authorization username is specified

Impact

maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username.

Patches

maddy 0.6.3 includes the fix for the bug.

Workarounds

There is no way to fix the issue without upgrading.

References

Permalink: https://github.com/advisories/GHSA-4g76-w3xw-2x6w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00Zzc2LXczeHctMng2d84AAyGN
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 9.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-4g76-w3xw-2x6w, CVE-2023-27582
References: Repository: https://github.com/foxcpp/maddy
Blast Radius: 2.7

Affected Packages

go:github.com/foxcpp/maddy
Dependent packages: 3
Dependent repositories: 2
Downloads:
Affected Version Ranges: >= 0.2.0, < 0.6.3
Fixed in: 0.6.3
All affected versions: 0.2.0, 0.2.1, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.6.0, 0.6.1, 0.6.2
All unaffected versions: 0.0.1, 0.1.0, 0.1.1, 0.6.3, 0.7.0, 0.7.1