Vulnerabilites related to gnuboard - gnuboard/gnuboard5
cve-2022-1252
Vulnerability from cvelistv5
Published
2022-04-11 10:15
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb | x_refsource_CONFIRM | |
https://0g.vc/posts/insecure-cipher-gnuboard5/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
gnuboard | gnuboard/gnuboard5 |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0g.vc/posts/insecure-cipher-gnuboard5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "gnuboard/gnuboard5", "vendor": "gnuboard", "versions": [ { "lessThanOrEqual": "5.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUse of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the \u0027Let others see my information.\u0027 box is ticked off. Or to send emails to any email address, with full control of its contents\u003c/p\u003e" } ], "value": "Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the \u0027Let others see my information.\u0027 box is ticked off. Or to send emails to any email address, with full control of its contents\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-02T08:41:17.963Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://0g.vc/posts/insecure-cipher-gnuboard5/" } ], "source": { "advisory": "c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb", "discovery": "EXTERNAL" }, "title": "Use of a Broken or Risky Cryptographic Algorithm in gnuboard/gnuboard5", "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-1252", "STATE": "PUBLIC", "TITLE": "Exposure of Private Personal Information to an Unauthorized Actor in gnuboard/gnuboard5" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gnuboard/gnuboard5", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.5.5" } ] } } ] }, "vendor_name": "gnuboard" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the \u0027Let others see my information.\u0027 box is ticked off. Or to send emails to any email address, with full control of its contents" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-359 Exposure of Private Personal Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb" }, { "name": "https://0g.vc/posts/insecure-cipher-gnuboard5/", "refsource": "MISC", "url": "https://0g.vc/posts/insecure-cipher-gnuboard5/" } ] }, "source": { "advisory": "c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2022-1252", "datePublished": "2022-04-11T10:15:14", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-08-02T23:55:24.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3831
Vulnerability from cvelistv5
Published
2021-12-14 10:50
Modified
2024-08-03 17:09
Severity ?
EPSS score ?
Summary
gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
References
▼ | URL | Tags |
---|---|---|
https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04 | x_refsource_CONFIRM | |
https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
gnuboard | gnuboard/gnuboard5 |
Version: unspecified < 5.4.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:09.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gnuboard/gnuboard5", "vendor": "gnuboard", "versions": [ { "lessThan": "5.4.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-14T10:50:10", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d" } ], "source": { "advisory": "25775287-88cd-4f00-b978-692d627dff04", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Reflected in gnuboard/gnuboard5", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@huntr.dev", "ID": "CVE-2021-3831", "STATE": "PUBLIC", "TITLE": "Cross-site Scripting (XSS) - Reflected in gnuboard/gnuboard5" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "gnuboard/gnuboard5", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.4.20" } ] } } ] }, "vendor_name": "gnuboard" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04", "refsource": "CONFIRM", "url": "https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04" }, { "name": "https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d", "refsource": "MISC", "url": "https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d" } ] }, "source": { "advisory": "25775287-88cd-4f00-b978-692d627dff04", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2021-3831", "datePublished": "2021-12-14T10:50:10", "dateReserved": "2021-09-27T00:00:00", "dateUpdated": "2024-08-03T17:09:09.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }