The OTR plugin for Gajim sends information in cleartext when using XHTML, which allows remote attackers to obtain sensitive information via unspecified vectors.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/10/30/11 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/30/2 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/94099 | Third Party Advisory VDB Entry |
https://dev.gajim.org/gajim/gajim-plugins/issues/145 | Issue Tracking Patch |
https://trac-plugins.gajim.org/changeset/c7c2e519ed63377bc943dd01c4661b0fe49321ae | Permissions Required |
Configurations
History
No history.
Information
Published : 2017-01-13 16:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-9107
Mitre link : CVE-2016-9107
CVE.ORG link : CVE-2016-9107
JSON object : View
Products Affected
otr
- gajim-otr
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor