Misskey is an open source, decentralized social media platform with ActivityPub support. Prior to version 2024.2.0, when fetching remote Activity Streams objects, Misskey doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Misskey instance fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate and take over an account on a remote server that satisfies all of the following properties: allows the threat actor to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as legitimate Activity Streams actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Version 2024.2.0 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-02-19T19:42:20.688Z
Updated: 2024-08-15T18:36:56.288Z
Reserved: 2024-02-08T22:26:33.513Z
Link: CVE-2024-25636
Vulnrichment
Updated: 2024-08-01T23:44:09.892Z
NVD
Status : Awaiting Analysis
Published: 2024-02-19T20:15:46.077
Modified: 2024-02-20T19:50:53.960
Link: CVE-2024-25636
Redhat
No data.