CVE-2023-52077
CVSS V2 None
CVSS V3 None
Description
Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5.
Overview
- CVE ID
- CVE-2023-52077
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-12-27T18:45:50.408Z
- Last Modified Date
- 2023-12-27T18:45:50.408Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc | x_refsource_CONFIRM |
https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c | x_refsource_MISC |
https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230 | x_refsource_MISC |
https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-52077 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52077 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 14:50:32 | Added to TrackCVE |