6.1
CVE-2023-42452
- EPSS 0.72%
- Veröffentlicht 19.09.2023 16:15:13
- Zuletzt bearbeitet 21.11.2024 08:22:33
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.x branch prior to versions 4.0.10, 4.2.8, and 4.2.0-rc2, under certain conditions, attackers can abuse the translation feature to bypass the server-side HTML sanitization, allowing unescaped HTML to execute in the browser. The impact is limited thanks to Mastodon's strict Content Security Policy, blocking inline scripts, etc. However a CSP bypass or loophole could be exploited to execute malicious XSS. Furthermore, it requires user interaction, as this can only occur upon clicking the “Translate” button on a malicious post. Versions 4.0.10, 4.2.8, and 4.2.0-rc2 contain a patch for this issue.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Joinmastodon ≫ Mastodon Version >= 4.0.0 < 4.0.10
Joinmastodon ≫ Mastodon Version >= 4.1.0 < 4.1.8
Joinmastodon ≫ Mastodon Version4.2.0 Updatebeta1
Joinmastodon ≫ Mastodon Version4.2.0 Updatebeta2
Joinmastodon ≫ Mastodon Version4.2.0 Updatebeta3
Joinmastodon ≫ Mastodon Version4.2.0 Updaterc1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.72% | 0.722 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| security-advisories@github.com | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.