CVE-2023-42450
CVSS V2 None
CVSS V3 None
Description
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 4.2.0-beta1 and prior to version 4.2.0-rc2, by crafting specific input, attackers can inject arbitrary data into HTTP requests issued by Mastodon. This can be used to perform confused deputy attacks if the server configuration includes `ALLOWED_PRIVATE_ADDRESSES` to allow access to local exploitable services. Version 4.2.0-rc2 has a patch for the issue.
Overview
- CVE ID
- CVE-2023-42450
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-09-19T15:53:39.685Z
- Last Modified Date
- 2023-09-25T14:32:40.787Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/mastodon/mastodon/security/advisories/GHSA-hcqf-fw2r-52g4 | x_refsource_CONFIRM |
https://github.com/mastodon/mastodon/commit/94893cf24fc95b32cc7a756262acbe008c20a9d2 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-42450 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42450 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 13:52:50 | Added to TrackCVE |