Inadequate Encryption Strength vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.3.5.
Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead.
Users are recommended to upgrade to version 1.4.0, which fixes the issue.
References
Configurations
History
10 Jul 2025, 21:31
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache
Apache answer |
|
CPE | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
References | () https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x - Mailing List, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/25/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/25/5 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/25/6 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/25/7 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/25/8 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/26/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/26/3 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/26/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/27/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/27/5 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/09/27/8 - Mailing List, Third Party Advisory |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Sep 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
25 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-25 08:15
Updated : 2025-07-10 21:31
NVD link : CVE-2024-40761
Mitre link : CVE-2024-40761
CVE.ORG link : CVE-2024-40761
JSON object : View
Products Affected
apache
- answer
CWE
CWE-326
Inadequate Encryption Strength