CVE-2017-15042
An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.
Published
2017-10-05T21:29:00.473
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 5.9 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
golang
|
go
|
≤ 1.8.3 |
Yes
|
Application |
golang
|
go
|
1.9 |
Yes
|
References
-
http://www.securityfocus.com/bid/101197
Third Party Advisory, VDB Entry
([email protected])
-
https://access.redhat.com/errata/RHSA-2017:3463
([email protected])
-
https://access.redhat.com/errata/RHSA-2018:0878
([email protected])
-
https://github.com/golang/go/issues/22134
Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://golang.org/cl/68023
Issue Tracking, Patch, Vendor Advisory
([email protected])
-
https://golang.org/cl/68210
Vendor Advisory
([email protected])
-
https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ
Mailing List, Vendor Advisory
([email protected])
-
https://security.gentoo.org/glsa/201710-23
Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/101197
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2017:3463
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2018:0878
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/golang/go/issues/22134
Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://golang.org/cl/68023
Issue Tracking, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://golang.org/cl/68210
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/201710-23
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)