Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-37903
HistoryJul 05, 2024 - 5:24 p.m.

CVE-2024-37903 Mastodon has improper authorship check on audience extension for existing posts

2024-07-0517:24:49
CWE-862
GitHub_M
www.cve.org
5
mastodon
microblogging platform
vulnerability
audience extension
patch

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS

0

Percentile

15.8%

Mastodon is a self-hosted, federated microblogging platform. Starting in version 2.6.0 and prior to versions 4.1.18 and 4.2.10, by crafting specific activities, an attacker can extend the audience of a post they do not own to other Mastodon users on a target server, thus gaining access to the contents of a post not intended for them. Versions 4.1.18 and 4.2.10 contain a patch for this issue.

CNA Affected

[
  {
    "vendor": "mastodon",
    "product": "mastodon",
    "versions": [
      {
        "version": ">= 2.6.0, < 4.1.18",
        "status": "affected"
      },
      {
        "version": ">= 4.2.0, < 4.2.10",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS

0

Percentile

15.8%

Related for CVELIST:CVE-2024-37903