On Wed, Sep 25, 2024 at 06:28:16AM +0000, Enxin Xie wrote:
> Severity: low
> 
> Affected versions:
> 
> - Apache Answer through 1.3.5
> 
> Description:
> 
> Inadequate Encryption Strength vulnerability in Apache Answer.
> 
> This issue affects Apache Answer: through 1.3.5.
> 
> Using the MD5 value of a user's email to access Gravatar is insecure and can 
> lead to the leakage of user email. The official recommendation is to use 
> SHA256 instead.
> Users are recommended to upgrade to version 1.4.0, which fixes the issue.
> 
> Credit:
> 
> 张岳熙 (reporter)
> 
> References:
> 
> https://answer.incubator.apache.org
> https://www.cve.org/CVERecord?id=CVE-2024-40761

What is the specific property of SHA256 required here?  Email addresses
have low entropy and I suspect they can be easily brute-forced, so
leaking the SHA256 has is still bad.  Instead, I would use a seeded PRF
with a seed only known to the server, ensuring that the resulting value
does not leak any information about the email.
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

Attachment: signature.asc
Description: PGP signature

Reply via email to