
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41259 affects Navidrome version 0.52.3, specifically related to the use of an insecure hashing algorithm in the Gravatar service implementation. The vulnerability was discovered in July 2024 and allows attackers to potentially manipulate user account information (GitHub Gist, NVD).
The vulnerability stems from the use of MD5 hashing algorithm for generating Gravatar URLs, despite Gravatar's official documentation now recommending SHA-256. The CVSS v3.1 base score is 9.1 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (NVD).
The vulnerability could allow attackers to modify user account information by exploiting the weaknesses in the MD5 hashing algorithm. This could lead to unauthorized access and manipulation of user profiles through the Gravatar service integration (GitHub Gist).
The recommended mitigation is to upgrade the hashing algorithm from MD5 to SHA-256 for Gravatar URL generation, as specified in the current Gravatar API documentation. This change would significantly reduce the security risks associated with the vulnerability (GitHub Gist).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."