CVE-2024-52591
CVSS V2 None
CVSS V3 None
Description
Misskey is an open source, federated social media platform. In affected versions missing validation in `ApRequestService.signedGet` and `HttpRequestService.getActivityJson` allows an attacker to create fake user profiles and forged notes. The spoofed users will appear to be from a different instance than the one where they actually exist, and the forged notes will appear to be posted by a different user. Vulnerable Misskey instances will accept the spoofed objects as valid, allowing an attacker to impersonate other users and instances. The attacker retains full control of the spoofed user / note and can interact like a real account. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Overview
- CVE ID
- CVE-2024-52591
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-12-18T19:20:31.238Z
- Last Modified Date
- 2024-12-18T19:20:31.238Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/misskey-dev/misskey/security/advisories/GHSA-m2gq-69fp-6hv4 | x_refsource_CONFIRM |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-52591 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52591 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-12-19 13:29:27 | Added to TrackCVE |