Vulnerability Database
Blog
FAQ
Docs
GO-2023-1630
See a problem?
Source
https://pkg.go.dev/vuln/GO-2023-1630
Import Source
https://vuln.go.dev/ID/GO-2023-1630.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2023-1630
Aliases
CVE-2023-27582
GHSA-4g76-w3xw-2x6w
Published
2024-08-20T20:29:14Z
Modified
2024-08-20T20:58:59.697374Z
Summary
Full authentication bypass if SASL authorization username is specified in github.com/foxcpp/maddy
Details
Full authentication bypass if SASL authorization username is specified in github.com/foxcpp/maddy
References
https://github.com/foxcpp/maddy/security/advisories/GHSA-4g76-w3xw-2x6w
https://nvd.nist.gov/vuln/detail/CVE-2023-27582
https://github.com/foxcpp/maddy/commit/55a91a37b71210f34f98f4d327c30308fe24399a
https://github.com/foxcpp/maddy/commit/9f58cb64b39cdc01928ec463bdb198c4c2313a9c
https://github.com/foxcpp/maddy/releases/tag/v0.6.3
Affected packages
Go
/
github.com/foxcpp/maddy
Package
Name
github.com/foxcpp/maddy
View open source insights on deps.dev
Purl
pkg:golang/github.com/foxcpp/maddy
Affected ranges
Type
SEMVER
Events
Introduced
0.2.0
Fixed
0.6.3
GO-2023-1630 - OSV