Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-24812
HistoryFeb 22, 2023 - 7:10 p.m.

CVE-2023-24812 SQL injection of notes/search-by-tag

2023-02-2219:10:16
CWE-89
GitHub_M
www.cve.org
cve-2023-24812
sql injection
misskey
notes/search-by-tag
version 13.3.3
parameter validation
upgrade
api endpoint
block access

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.5%

Misskey is an open source, decentralized social media platform. In versions prior to 13.3.3 SQL injection is possible due to insufficient parameter validation in the note search API by tag (notes/search-by-tag). This has been fixed in version 13.3.3. Users are advised to upgrade. Users unable to upgrade should block access to the api/notes/search-by-tag endpoint.

CNA Affected

[
  {
    "vendor": "misskey-dev",
    "product": "misskey",
    "versions": [
      {
        "version": "< 13.3.3",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.5%

Related for CVELIST:CVE-2023-24812