← Back to CVEs
CVE-2022-1252
HIGH8.2
Description
Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents
CVE Details
CVSS v3.1 Score8.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/11/2022
Last Modified2/24/2026
Sourcenvd
Honeypot Sightings0
Affected Products
sir:gnuboard
Weaknesses (CWE)
CWE-327CWE-327
References
https://0g.vc/posts/insecure-cipher-gnuboard5/(security@huntr.dev)
https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb(security@huntr.dev)
https://0g.vc/posts/insecure-cipher-gnuboard5/(af854a3a-2127-422b-91ae-364da2661108)
https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.