The OTR plugin for Gajim sends information in cleartext when using XHTML, which allows remote attackers to obtain sensitive information via unspecified vectors.
References
Link | Resource |
---|---|
https://trac-plugins.gajim.org/changeset/c7c2e519ed63377bc943dd01c4661b0fe49321ae | Permissions Required |
https://dev.gajim.org/gajim/gajim-plugins/issues/145 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2016/10/30/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/30/11 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/94099 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-01-13 08:59
Updated : 2017-01-18 12:49
NVD link : CVE-2016-9107
Mitre link : CVE-2016-9107
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
otr
- gajim-otr