CVE-2024-40761

Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation is to use SHA256 instead. Users are recommended to upgrade to version 1.4.0, which fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*

History

10 Jul 2025, 21:31

Type Values Removed Values Added
References () https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x - () https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/25/2 - () http://www.openwall.com/lists/oss-security/2024/09/25/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/25/5 - () http://www.openwall.com/lists/oss-security/2024/09/25/5 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/25/6 - () http://www.openwall.com/lists/oss-security/2024/09/25/6 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/25/7 - () http://www.openwall.com/lists/oss-security/2024/09/25/7 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/25/8 - () http://www.openwall.com/lists/oss-security/2024/09/25/8 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/26/1 - () http://www.openwall.com/lists/oss-security/2024/09/26/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/26/3 - () http://www.openwall.com/lists/oss-security/2024/09/26/3 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/26/4 - () http://www.openwall.com/lists/oss-security/2024/09/26/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/27/4 - () http://www.openwall.com/lists/oss-security/2024/09/27/4 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/27/5 - () http://www.openwall.com/lists/oss-security/2024/09/27/5 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/09/27/8 - () http://www.openwall.com/lists/oss-security/2024/09/27/8 - Mailing List, Third Party Advisory
First Time Apache answer
Apache
CPE cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*

Information

Published : 2024-09-25 08:15

Updated : 2025-07-10 21:31


NVD link : CVE-2024-40761

Mitre link : CVE-2024-40761

CVE.ORG link : CVE-2024-40761


JSON object : View

Products Affected

apache

  • answer
CWE
CWE-326

Inadequate Encryption Strength