This issue affects Apache Answer: through 1.3.5.
Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead.
Users are recommended to upgrade to version 1.4.0, which fixes the issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-48cr-j2cx-mcr8 | Apache Answer: Avatar URL leaked user email addresses |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
Wed, 25 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache answer |
|
| CPEs | cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache answer |
|
| Metrics |
cvssV3_1
|
Wed, 25 Sep 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue. | |
| Title | Apache Answer: Avatar URL leaked user email addresses | |
| Weaknesses | CWE-326 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-27T19:02:34.376Z
Reserved: 2024-07-10T07:49:21.665Z
Link: CVE-2024-40761
Updated: 2024-09-27T19:02:34.376Z
Status : Analyzed
Published: 2024-09-25T08:15:04.437
Modified: 2025-07-10T21:31:58.710
Link: CVE-2024-40761
No data.
OpenCVE Enrichment
No data.
Github GHSA