CVE-2024-40761
📋 TL;DR
This vulnerability in Apache Answer uses weak MD5 hashing of user email addresses for Gravatar integration, potentially exposing email addresses through hash reversal attacks. It affects all Apache Answer installations through version 1.3.5. Attackers could deanonymize users by obtaining their email addresses from the MD5 hashes.
💻 Affected Systems
- Apache Answer
📦 What is this software?
Answer by Apache
⚠️ Risk & Real-World Impact
Worst Case
Mass user email address exposure leading to targeted phishing, spam campaigns, or identity correlation across services.
Likely Case
Individual user email addresses could be discovered through hash reversal techniques, compromising user privacy.
If Mitigated
Limited to privacy impact with no system compromise or data modification.
🎯 Exploit Status
Exploitation requires access to MD5 hashes and hash reversal capabilities.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.0
Vendor Advisory: https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x
Restart Required: Yes
Instructions:
1. Backup your Apache Answer installation and database. 2. Download Apache Answer 1.4.0 from the official website. 3. Replace existing installation files with new version. 4. Restart the Apache Answer service.
🔧 Temporary Workarounds
Disable Gravatar Integration
allTemporarily disable Gravatar functionality to prevent email hash exposure.
Edit configuration to disable Gravatar or modify code to skip Gravatar calls
🧯 If You Can't Patch
- Implement network segmentation to limit access to Apache Answer instance
- Monitor for unusual access patterns to user profile/Gravatar endpoints
🔍 How to Verify
Check if Vulnerable:
Check Apache Answer version in admin panel or configuration files. Versions 1.3.5 and earlier are vulnerable.
Check Version:
Check admin panel or examine version.txt in installation directory
Verify Fix Applied:
Verify version is 1.4.0 or later and check that Gravatar URLs now use SHA256 instead of MD5.
📡 Detection & Monitoring
Log Indicators:
- Multiple requests to Gravatar endpoints with MD5 hashes
- Unusual pattern of user profile access
Network Indicators:
- External requests to Gravatar API with MD5 parameters
SIEM Query:
source="apache_answer" AND (uri="*gravatar*" OR user_agent="*gravatar*")
🔗 References
- https://lists.apache.org/thread/mmrhsfy16qwrw0pkv0p9kj40vy3sg08x
- http://www.openwall.com/lists/oss-security/2024/09/25/2
- http://www.openwall.com/lists/oss-security/2024/09/25/5
- http://www.openwall.com/lists/oss-security/2024/09/25/6
- http://www.openwall.com/lists/oss-security/2024/09/25/7
- http://www.openwall.com/lists/oss-security/2024/09/25/8
- http://www.openwall.com/lists/oss-security/2024/09/26/1
- http://www.openwall.com/lists/oss-security/2024/09/26/3
- http://www.openwall.com/lists/oss-security/2024/09/26/4
- http://www.openwall.com/lists/oss-security/2024/09/27/4
- http://www.openwall.com/lists/oss-security/2024/09/27/5
- http://www.openwall.com/lists/oss-security/2024/09/27/8