Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-52077
HistoryDec 27, 2023 - 6:45 p.m.

CVE-2023-52077 External apps using tokens issued by administrators and moderators can call admin APIs

2023-12-2718:45:50
CWE-863
GitHub_M
www.cve.org
4
nexkey
security patch
admin apis
external apps
compromise
object storage

CVSS3

8.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

9.6

Confidence

High

EPSS

0.001

Percentile

29.7%

Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5.

CNA Affected

[
  {
    "vendor": "nexryai",
    "product": "nexkey",
    "versions": [
      {
        "version": "< 12.23Q4.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L

AI Score

9.6

Confidence

High

EPSS

0.001

Percentile

29.7%

Related for CVELIST:CVE-2023-52077