==================================================================== CERT-Renater Note d'Information No. 2024/VULN384 _____________________________________________________________________ DATE : 25/09/2024 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Apache Answer versions prior to 1.4.0. ===================================================================== https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x _____________________________________________________________________ CVE-2024-40761: Apache Answer: Avatar URL leaked user email addresses Severity: low Affected versions: - Apache Answer through 1.3.5 Description: Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue. Credit: 张岳熙 (reporter) References: https://answer.incubator.apache.org https://www.cve.org/CVERecord?id=CVE-2024-40761 ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================