muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
References
Configurations
History
21 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/07/28/4 - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BZRRPCNOETB4MN4XSYPRBBKDIHO27DY/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EMKIOEP2CYWHVVUCNWISPE4AGH4IR7O2/ - | |
References | () https://prosody.im/ - Exploit, Product | |
References | () https://prosody.im/security/advisory_20210722/ - Vendor Advisory |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-30 14:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37601
Mitre link : CVE-2021-37601
CVE.ORG link : CVE-2021-37601
JSON object : View
Products Affected
prosody
- prosody
CWE