muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
References
Link | Resource |
---|---|
https://prosody.im/ | Exploit Product |
https://prosody.im/security/advisory_20210722/ | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMKIOEP2CYWHVVUCNWISPE4AGH4IR7O2/ | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/07/28/4 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BZRRPCNOETB4MN4XSYPRBBKDIHO27DY/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2021-07-30 07:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-37601
Mitre link : CVE-2021-37601
JSON object : View
CWE
Products Affected
prosody
- prosody