Vulnerability Report: GO-2023-1630
- CVE-2023-27582, GHSA-4g76-w3xw-2x6w
- Affects: github.com/foxcpp/maddy
- Published: Aug 20, 2024
- Unreviewed
Full authentication bypass if SASL authorization username is specified in github.com/foxcpp/maddy
For detailed information about this vulnerability, visit https://github.com/foxcpp/maddy/security/advisories/GHSA-4g76-w3xw-2x6w or https://nvd.nist.gov/vuln/detail/CVE-2023-27582.
Affected Modules
-
PathGo Versions
-
from v0.2.0 before v0.6.3
Aliases
References
- https://github.com/foxcpp/maddy/security/advisories/GHSA-4g76-w3xw-2x6w
- https://nvd.nist.gov/vuln/detail/CVE-2023-27582
- https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a
- https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c
- https://github.com/foxcpp/maddy/releases/tag/v0.6.3
- https://vuln.go.dev/ID/GO-2023-1630.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.