First published: Wed Jan 26 2022(Updated: )
BuddyBoss Platform through 1.8.0 allows remote attackers to obtain the email address of each user. When creating a new user, it generates a Unique ID for their profile. This UID is their private email address with symbols removed and periods replaced with hyphens. For example. JohnDoe@example.com would become /members/johndoeexample-com and Jo.test@example.com would become /members/jo-testexample-com. The members list is available to everyone and (in a default configuration) often without authentication. It is therefore trivial to collect a list of email addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BuddyBoss | <=1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44692 is a vulnerability in BuddyBoss Platform through version 1.8.0 that allows remote attackers to obtain the email address of each user.
CVE-2021-44692 works by generating a Unique ID for each user's profile, which is their private email address with symbols removed and periods replaced with hyphens.
The severity of CVE-2021-44692 is medium, with a severity value of 5.3.
To fix CVE-2021-44692, update BuddyBoss Platform to version 1.8.1 or higher.
You can find more information about CVE-2021-44692 on the BuddyBoss Platform Releases page and the Cygenta blog post linked in the references.