Skip to content

Instantly share code, notes, and snippets.

@nyxfqq
Created July 31, 2024 03:09
Show Gist options
  • Save nyxfqq/d192af10b53a363e2d9e430068333e04 to your computer and use it in GitHub Desktop.
Save nyxfqq/d192af10b53a363e2d9e430068333e04 to your computer and use it in GitHub Desktop.
CVE-2024-41259
[Suggested description]
Navidrome v0.52.3 was discovered to use an insecure hashing algorithm
to generate URLs.
the official Gravatar documentation now advocates using SHA-256 to generate URLs,
as demonstrated in their API example (https://docs.gravatar.com/api/avatars/go/).
An MD5-based URL could potentially lead to situations where an attacker change
another user's info under a controlled email address, introducing security
vulnerabilities due to the known weaknesses of the MD5 algorithm. Although
this concern primarily pertains to Gravatar's service, adhering to best
practices by upgrading to a more secure hashing algorithm such as
SHA-256 would significantly mitigate these risks.
------------------------------------------
[VulnerabilityType Other]
CWE305 CWE306
------------------------------------------
[Vendor of Product]
https://github.com/navidrome/navidrome
------------------------------------------
[Affected Product Code Base]
navidrome - <=0.52.3
------------------------------------------
[Affected Component]
gravatar
------------------------------------------
[Attack Type]
Physical
------------------------------------------
[Impact Denial of Service]
true
------------------------------------------
[Attack Vectors]
Use the MD5 algorithm in the code to summarize the email address and calculate the URL of the avatar
------------------------------------------
[Discoverer]
Yuexi Zhang
------------------------------------------
[Reference]
http://navidrome.com
https://docs.gravatar.com/api/avatars/go/
https://github.com/navidrome/navidrome
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment