Vulnerability Report: GO-2021-0178
standard library- CVE-2017-15042
- Affects: net/smtp
- Published: Jan 07, 2022
- Modified: May 20, 2024
SMTP clients using net/smtp can use the PLAIN authentication scheme on network connections not secured with TLS, exposing passwords to man-in-the-middle SMTP servers.
Affected Packages
-
PathGo VersionsSymbols
-
from go1.1.0-0 before go1.8.4, from go1.9.0-0 before go1.9.1
1 unexported affected symbols
- plainAuth.Start
Aliases
References
- https://go.dev/cl/68170
- https://go.googlesource.com/go/+/ec3b6131de8f9c9c25283260c95c616c74f6d790
- https://go.dev/issue/22134
- https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ
- https://vuln.go.dev/ID/GO-2021-0178.json
Credits
- Stevie Johnstone
Feedback
See anything missing or incorrect?
Suggest an edit to this report.