{"api_version":"1","generated_at":"2026-05-13T00:06:35+00:00","cve":"CVE-2022-24732","urls":{"html":"https://cve.report/CVE-2022-24732","api":"https://cve.report/api/cve/CVE-2022-24732.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24732","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24732"},"summary":{"title":"CVE-2022-24732","description":"Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-03-09 20:15:00","updated_at":"2022-03-17 01:44:00"},"problem_types":["CWE-613","CWE-324"],"metrics":[],"references":[{"url":"https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583","name":"https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583","refsource":"MISC","tags":[],"title":"auth/pam: Check for account/password expiry · foxcpp/maddy@7ee6a39 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9","name":"https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9","refsource":"CONFIRM","tags":[],"title":"auth.pam allows accounts with expired passwords and expired accounts · Advisory · foxcpp/maddy · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24732","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24732","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24732","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"maddy_project","cpe5":"maddy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24732","STATE":"PUBLIC","TITLE":"Maddy Mail Server does not implement account expiry"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"maddy","version":{"version_data":[{"version_value":"< 0.5.4"}]}}]},"vendor_name":"foxcpp"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-613: Insufficient Session Expiration"}]},{"description":[{"lang":"eng","value":"CWE-324: Use of a Key Past its Expiration Date"}]}]},"references":{"reference_data":[{"name":"https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9","refsource":"CONFIRM","url":"https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9"},{"name":"https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583","refsource":"MISC","url":"https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583"}]},"source":{"advisory":"GHSA-6cp7-g972-w9m9","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-03-09 20:15:00","lastModifiedDate":"2022-03-17 01:44:00","problem_types":["CWE-613","CWE-324"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:maddy_project:maddy:*:*:*:*:*:*:*:*","versionStartIncluding":"0.5.0","versionEndExcluding":"0.5.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24732","Ordinal":"228136","Title":"CVE-2022-24732","CVE":"CVE-2022-24732","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24732","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}