CVE-2021-32750

MuWire is a file publishing and networking tool that protects the identity of its users by using I2P technology. Users of MuWire desktop client prior to version 0.8.8 can be de-anonymized by an attacker who knows their full ID. An attacker could send a message with a subject line containing a URL with an HTML image tag and the MuWire client would try to fetch that image via clearnet, thus exposing the IP address of the user. The problem is fixed in MuWire 0.8.8. As a workaround, users can disable messaging functionality to prevent other users from sending them malicious messages.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:muwire_project:muwire:*:*:*:*:*:*:*:*

History

02 Jul 2022, 18:51

Type Values Removed Values Added
CWE CWE-200 CWE-79

27 Jul 2021, 14:39

Type Values Removed Values Added
References (CONFIRM) https://github.com/zlatinb/muwire/security/advisories/GHSA-68xh-9h7w-64qg - (CONFIRM) https://github.com/zlatinb/muwire/security/advisories/GHSA-68xh-9h7w-64qg - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.7
CWE CWE-200
CPE cpe:2.3:a:muwire_project:muwire:*:*:*:*:*:*:*:*

15 Jul 2021, 17:21

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-15 17:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32750

Mitre link : CVE-2021-32750

CVE.ORG link : CVE-2021-32750


JSON object : View

Products Affected

muwire_project

  • muwire
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor