CVE Vulnerabilities

CVE-2024-49395

Exposure of Sensitive Information Through Metadata

Published: Nov 12, 2024 | Modified: Nov 14, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW

In mutt and neomutt, PGP encryption does not use the –hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.

Weakness

The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit access to metadata that is derived from the original, sensitive information.

Affected Software

Name Vendor Start Version End Version
Mutt Mutt - (including) - (including)
Neomutt Neomutt - (including) - (including)
Mutt Ubuntu devel *
Mutt Ubuntu esm-infra/bionic *
Mutt Ubuntu esm-infra/xenial *
Mutt Ubuntu focal *
Mutt Ubuntu jammy *
Mutt Ubuntu noble *
Mutt Ubuntu oracular *

Extended Description

Developers might correctly prevent unauthorized access to a database or other resource containing sensitive information, but they might not consider that portions of the original information might also be recorded in metadata, search indices, statistical reports, or other resources. If these resources are not also restricted, then attackers might be able to extract some or all of the original information, or otherwise infer some details. For example, an attacker could specify search terms that are known to be unique to a particular person, or view metadata such as activity or creation dates in order to identify usage patterns.

References