CVE-2023-42450

Server-Side Request Forgery (SSRF) (CWE-918)

Published: Sep 19, 2023 / Updated: 14mo ago

010
CVSS 7.5EPSS 0.04%High
CVE info copied to clipboard

Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 4.2.0-beta1 and prior to version 4.2.0-rc2, by crafting specific input, attackers can inject arbitrary data into HTTP requests issued by Mastodon. This can be used to perform confused deputy attacks if the server configuration includes `ALLOWED_PRIVATE_ADDRESSES` to allow access to local exploitable services. Version 4.2.0-rc2 has a patch for the issue.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2023-42450. See article

Sep 19, 2023 at 3:09 PM / github.com
CVE Assignment

NVD published the first details for CVE-2023-42450

Sep 19, 2023 at 4:15 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.2%)

Sep 20, 2023 at 5:34 PM
Threat Intelligence Report

CVE-2023-42450 is a critical SSRF vulnerability in GHSA-hcqf-fw2r-52g4, leading to remote code execution. It is not exploitable in production in default configuration, but pre-releases are at risk. There are no known proof-of-concept exploits, and mitigation can be achieved by avoiding pre-releases and applying patches when available. See article

Oct 13, 2023 at 8:09 AM
Static CVE Timeline Graph

Affected Systems

Joinmastodon/mastodon
+null more

Patches

github.com
+null more

Attack Patterns

CAPEC-664: Server Side Request Forgery
+null more

References

From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.
From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.
From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.

News

CVE-2023-42450
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 4.2.0-beta1 and prior to version 4.2.0-rc2, by crafting specific input, attackers can inject arbitrary data into HTTP requests issued by Mastodon. This can be used to perform confused deputy attacks if CVE-2023-42450 originally published on CyberSecurityBoard
AppSec Ezine #505
URL: https://www.sonarsource.com/blog/security-vulnerabilities-in-casaos/ Description: Security Vulnerabilities in CasaOS. URL: https://github.com/SiriusScan/Sirius Description: Open-source general purpose vulnerability scanner.
From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.
From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.
From SSRF to RCE on Mastodon (CVE-2023-42450)
A Server-Side Request Forgery (also known as SSRF) vulnerability is present in the WebFinger code. It allows an attacker to send arbitrary data to the Redis server and leads to arbitrary code execution under the user.
See 14 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI