{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T05:42:57.487","vulnerabilities":[{"cve":{"id":"CVE-2017-5658","sourceIdentifier":"security@apache.org","published":"2018-10-04T14:29:00.327","lastModified":"2024-11-21T03:28:07.573","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The statistics generator in Apache Pony Mail 0.7 to 0.9 was found to be returning timestamp data without proper authorization checks. This could lead to derived information disclosure on private lists about the timing of specific email subjects or text bodies, though without disclosing the content itself. As this was primarily used as a caching feature for faster loading times, the caching was disabled by default to prevent this. Users using 0.9 should upgrade to 0.10 to address this issue."},{"lang":"es","value":"Se ha detectado que el generador de estadísticas en Apache Pony Mail desde la versión 0.7 hasta la 0.9 devuelve datos de marcas de tiempo sin las comprobaciones de autorización apropiadas. Esto podría conducir a una divulgación de información derivada en listas privadas sobre las sincronizaciones de los asuntos o los cuerpos de texto de determinados correos, aunque sin divulgar su contenido. Ya que se usó en primera instancia como una característica de cacheo de memoria para aumentar la velocidad de carga, el cacheo de memoria estaba deshabilitado por defecto para prevenir esto. Los usuarios que utilicen la versión 0.9 deberían actualizar a la versión 0.10 para solucionar este problema."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:pony_mail:*:*:*:*:*:*:*:*","versionStartIncluding":"0.7","versionEndIncluding":"0.9","matchCriteriaId":"DB4A83C5-8DFB-465C-9024-AA58DC021750"}]}]}],"references":[{"url":"https://lists.apache.org/thread.html/6a18cf5690d54231836f277f2b4346b53da3b6b6b08fee4c4ef4977e%40%3Cdev.ponymail.apache.org%3E","source":"security@apache.org"},{"url":"https://lists.apache.org/thread.html/6a18cf5690d54231836f277f2b4346b53da3b6b6b08fee4c4ef4977e%40%3Cdev.ponymail.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}