Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. mellium.im/sasl
  4. ›
  5. CVE-2022-48195

CVE-2022-48195: Mellium vulnerable to authentication failure or insufficient randomness used during authentication

December 31, 2022 (updated January 4, 2023)

An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.

References

  • github.com/advisories/GHSA-gvfj-fxx3-j323
  • mellium.im/cve/cve-2022-48195/
  • nvd.nist.gov/vuln/detail/CVE-2022-48195

Code Behaviors & Features

Detect and mitigate CVE-2022-48195 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.1

Fixed versions

  • 0.3.1

Solution

Upgrade to version 0.3.1 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Source file

go/mellium.im/sasl/CVE-2022-48195.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.