Sunday, May 24, 2026

Gravatar “violating” exposure of 100+ million user data


The security alert company HaveIBeenPwned notified users that the personal data of 114 million Gravatar users had been leaked online, which they called a data breach. Gravatar denies that it was hacked.

This is a screenshot of the email sent to the HaveIBeenPwned user, which describes the Gravatar incident as a data breach:

Gravatar enumeration vulnerability

The user information of everyone with a Gravatar account can be downloaded using software that “grabs” data.

advertise

Keep reading below

Although this is not technically a violation, Gravatar stores user information in a way that makes it easy for malicious people to obtain user information, which can then be used as part of another attack to obtain passwords and access permissions.

Gravatar accounts are public information. However, individual user profile accounts are not publicly listed in an easy-to-browse manner. Generally, a person must know account information such as username to find the account and all publicly available information.

A security researcher discovered at the end of 2020 that Gravatar user account information was recorded in numerical order. A news report at the time described how security researchers peeked into the JSON file linked in the profile page, revealing an ID number that corresponds to the number assigned to the user.

The problem with the user identification number is that it can be used to access the configuration file.

advertise

Keep reading below

Since the numbers are not randomly generated, but in numerical order, anyone who wants to access all Gravatar usernames can access that information by requesting and grabbing user profiles in numerical order.

Data capture event

A data breach is defined as an unauthorized person gaining access to non-public information.

Gravatar information is public, but outsiders must know the user name of the Gravatar user to access the Gravatar user profile. In addition, the user’s email address is stored in an insecure encryption method (called an MD5 hash).

MD5 hashes are insecure and can be easily decrypted (also known as cracking). Storing email addresses in MD5 format provides only slight security protection.

This means that once the attacker downloads the user name and email MD5 hash value, it is easy to extract the user’s email address.

According to the security researcher who initially discovered the username enumeration vulnerability, Gravatar has “almost no rate limit”, which means that crawling bots can request millions of user profiles without being blocked or questioned due to suspicious behavior .

according to News report From October 2020, when the vulnerability was initially disclosed:

“Although the data provided by Gravatar users in their personal profiles has been made public, there is almost no rate limit for the simple user enumeration of the service, which raises concerns about large-scale collection of user data.”

Gravatar minimizes user data collection

Gravatar issued a public statement to minimize the impact of user information collection.

advertise

Keep reading below

this Last tweet In the Gravatar series, readers are encouraged to understand how Gravatar works:

“If you want to learn more about how Gravatar works or adjust the data shared in your profile, please visit http://Gravatar.com.”

Ironically, Gravatar uses HTTP to link to an insecure URL protocol. After reaching the URL, Gravatar did not redirect to the secure (HTTPS) version of the web page, which would only undermine their efforts to project a sense of security.

Twitter user reaction

A Twitter user opposed the use of “violation“Because the information is public.

advertise

Keep reading below

The person behind the HaveIBeenPwned website responded:

Why Gravatar crawl events are important

Troy Hunt, the person behind HaveIBeenPwned, explained in a series of tweets why the Gravatar crawl incident is important.

Troy asserted that the data users entrusted to Gravatar were used in unexpected ways.

Gravatar user trust is eroded

Users want to control their Gravatar information

Troy asserts that users want to know how their information is used and accessed.

advertise

Keep reading below

Has the Gravatar user been stolen?

An argument can be made that the Gravatar account can be public, but it is not easy to be harvested by someone with malicious intent as the first step in a hacking incident.

Gravatar claims that after the enumeration attack vulnerability was disclosed, they have taken steps to close it to prevent further downloading of user information.

Therefore, on the one hand, Gravatar takes measures to prevent malicious people from collecting user information. On the other hand, they said that the report that Gravatar was hacked was misinformation.

But the fact is, HaveIBeenPwned did not call it a hacking incident, but called it a violation.

It can be said that Gravatar uses MD5 hash to store email data is insecure. Once hackers crack the insecure encryption, the abnormal capture of “public information” becomes a loophole.

advertise

Keep reading below

Many Gravatar users are not particularly happy and are looking for answers:





Source link

Related articles

Most Popular Baby Names 2024: Top Picks

Join us as we explore the captivating world of the most popular baby names for 2024! Which name will you choose...

Most Popular Baby Names 2024: Top Picks

Join us as we explore the captivating world of the most popular baby names for 2024! Which name will you choose...

How to Settle a Colic Baby: Proven Tips

Eager to discover effective ways to calm your colicky baby? From soothing techniques to critical consultation cues, let's explore what...

What Is Colic in Babies: Key Facts Revealed

Understanding what colic in babies truly entails can be a challenge for many parents. As the evening wears on, and the baby's cries reach a crescendo, an urgent question looms in the air: what now?

The 7 Best Ways to Gain Popularity

Online searches are often not the starting point...
spot_imgspot_img