Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4g76-w3xw-2x6w: Full authentication bypass if SASL authorization username is specified

Impact

maddy 0.2.0 - 0.6.2 allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified authorization username, it is accepted as is after checking the credentials for the authentication username.

Patches

maddy 0.6.3 includes the fix for the bug.

Workarounds

There is no way to fix the issue without upgrading.

References

  • Commit that introduced the vulnerable code: https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a
  • Fix: https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c
ghsa
#vulnerability#git#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-27582

Full authentication bypass if SASL authorization username is specified

Critical severity GitHub Reviewed Published Mar 13, 2023 in foxcpp/maddy • Updated Mar 14, 2023

Package

gomod github.com/foxcpp/maddy (Go)

Affected versions

>= 0.2.0, < 0.6.3

Description

Published by the National Vulnerability Database

Mar 13, 2023

Published to the GitHub Advisory Database

Mar 14, 2023

Last updated

Mar 14, 2023

Related news

CVE-2023-27582: Full authentication bypass if SASL authorization username is specified

maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.

ghsa: Latest News

GHSA-8gc2-vq6m-rwjw: Amazon Redshift Python Connector vulnerable to SQL Injection