Описание
Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue.
Ссылки
- Mailing ListVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3.5 (включая)
cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*
EPSS
Процентиль: 69%
0.00595
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-326
Связанные уязвимости
CVSS3: 5.3
github
больше 1 года назад
Apache Answer: Avatar URL leaked user email addresses
EPSS
Процентиль: 69%
0.00595
Низкий
5.3 Medium
CVSS3
Дефекты
CWE-326