CVE-2025-29868
📋 TL;DR
This vulnerability in Apache Answer allows external image providers to obtain the IP addresses of users who view their images. It affects all Apache Answer installations through version 1.4.2. The issue occurs when users access externally referenced images, leaking private user information to third parties.
💻 Affected Systems
- Apache Answer
📦 What is this software?
Answer by Apache
⚠️ Risk & Real-World Impact
Worst Case
Mass collection of user IP addresses by malicious actors, enabling targeted attacks, profiling, or correlation with other data breaches.
Likely Case
External image providers (including potential attackers) can track which users access specific content, compromising user privacy.
If Mitigated
Limited to non-sensitive information disclosure if proper network segmentation and privacy controls are implemented.
🎯 Exploit Status
Exploitation requires an attacker to host an external image that users access through the vulnerable Apache Answer instance.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.5
Vendor Advisory: https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf
Restart Required: Yes
Instructions:
1. Download Apache Answer 1.4.5 from official sources. 2. Backup current installation and data. 3. Replace with new version files. 4. Restart the Apache Answer service. 5. Configure external content settings as needed.
🔧 Temporary Workarounds
Disable External Images
allConfigure Apache Answer to block or not display externally referenced images
Configure in admin settings: Set 'Allow external images' to false
Network Filtering
allBlock outbound requests to external image hosts at network level
Configure firewall rules to block image requests to untrusted domains
🧯 If You Can't Patch
- Implement strict content security policies to block external image loading
- Use reverse proxy to strip or rewrite external image URLs before reaching Apache Answer
🔍 How to Verify
Check if Vulnerable:
Check Apache Answer version in admin panel or configuration files. Versions 1.4.2 and below are vulnerable.
Check Version:
Check version in web interface admin panel or examine configuration files for version information
Verify Fix Applied:
Verify version is 1.4.5 or later, and test that external images are properly controlled via admin settings.
📡 Detection & Monitoring
Log Indicators:
- Outbound requests to external image hosts from Apache Answer server
- User access logs showing external image URLs
Network Indicators:
- HTTP requests from Apache Answer server to external image domains
- DNS queries for external image hosts
SIEM Query:
source="apache-answer" AND (url CONTAINS "http://" OR url CONTAINS "https://") AND (url CONTAINS ".jpg" OR url CONTAINS ".png" OR url CONTAINS ".gif")