logo

CVE-2024-40761 github.com/apache/incubator-answer

Package

Manager: go
Name: github.com/apache/incubator-answer
Vulnerable Version: >=0 <1.4.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/U:Green

EPSS: 0.01381 pctl0.79551

Details

Apache Answer: Avatar URL leaked user email addresses Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue.

Metadata

Created: 2024-09-25T09:30:46Z
Modified: 2025-07-11T15:04:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-48cr-j2cx-mcr8/GHSA-48cr-j2cx-mcr8.json
CWE IDs: ["CWE-326"]
Alternative ID: GHSA-48cr-j2cx-mcr8
Finding: F052
Auto approve: 1