maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0863 maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.
Github GHSA Github GHSA GHSA-4g76-w3xw-2x6w Full authentication bypass if SASL authorization username is specified
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 25 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-25T14:58:06.143Z

Reserved: 2023-03-04T01:03:53.633Z

Link: CVE-2023-27582

cve-icon Vulnrichment

Updated: 2024-08-02T12:16:36.244Z

cve-icon NVD

Status : Modified

Published: 2023-03-13T22:15:12.387

Modified: 2024-11-21T07:53:11.747

Link: CVE-2023-27582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.