CVE-2017-15042

MEDIUM

Description

An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.

References

http://www.securityfocus.com/bid/101197

https://access.redhat.com/errata/RHSA-2017:3463

https://access.redhat.com/errata/RHSA-2018:0878

https://github.com/golang/go/issues/22134

https://golang.org/cl/68023

https://golang.org/cl/68210

https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ

https://security.gentoo.org/glsa/201710-23

Details

Source: MITRE

Published: 2017-10-05

Updated: 2018-04-12

Type: CWE-200

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM