CVE-2024-40761

5.3 MEDIUM

📋 TL;DR

This vulnerability in Apache Answer uses weak MD5 hashing of user email addresses for Gravatar integration, potentially exposing email addresses through hash reversal attacks. It affects all Apache Answer installations through version 1.3.5. Attackers could deanonymize users by obtaining their email addresses from the MD5 hashes.

💻 Affected Systems

Products:
  • Apache Answer
Versions: through 1.3.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using Gravatar integration are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass user email address exposure leading to targeted phishing, spam campaigns, or identity correlation across services.

🟠

Likely Case

Individual user email addresses could be discovered through hash reversal techniques, compromising user privacy.

🟢

If Mitigated

Limited to privacy impact with no system compromise or data modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to MD5 hashes and hash reversal capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.0

Vendor Advisory: https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x

Restart Required: Yes

Instructions:

1. Backup your Apache Answer installation and database. 2. Download Apache Answer 1.4.0 from the official website. 3. Replace existing installation files with new version. 4. Restart the Apache Answer service.

🔧 Temporary Workarounds

Disable Gravatar Integration

all

Temporarily disable Gravatar functionality to prevent email hash exposure.

Edit configuration to disable Gravatar or modify code to skip Gravatar calls

🧯 If You Can't Patch

  • Implement network segmentation to limit access to Apache Answer instance
  • Monitor for unusual access patterns to user profile/Gravatar endpoints

🔍 How to Verify

Check if Vulnerable:

Check Apache Answer version in admin panel or configuration files. Versions 1.3.5 and earlier are vulnerable.

Check Version:

Check admin panel or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 1.4.0 or later and check that Gravatar URLs now use SHA256 instead of MD5.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to Gravatar endpoints with MD5 hashes
  • Unusual pattern of user profile access

Network Indicators:

  • External requests to Gravatar API with MD5 parameters

SIEM Query:

source="apache_answer" AND (uri="*gravatar*" OR user_agent="*gravatar*")

🔗 References

📤 Share & Export