First published: Thu Oct 04 2018(Updated: )
The statistics generator in Apache Pony Mail 0.7 to 0.9 was found to be returning timestamp data without proper authorization checks. This could lead to derived information disclosure on private lists about the timing of specific email subjects or text bodies, though without disclosing the content itself. As this was primarily used as a caching feature for faster loading times, the caching was disabled by default to prevent this. Users using 0.9 should upgrade to 0.10 to address this issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Pony Mail | >=0.7<=0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5658 has a medium severity rating due to its potential to lead to information disclosure.
To fix CVE-2017-5658, upgrade Apache Pony Mail to version 1.0 or later where this vulnerability is addressed.
CVE-2017-5658 allows unauthorized access to timestamp data related to email subjects and text bodies on private lists.
CVE-2017-5658 affects Apache Pony Mail versions from 0.7 to 0.9.
No, CVE-2017-5658 does not disclose content of emails but exposes timing information related to them.