Misskey is an open source, decentralized social media platform with ActivityPub support. Prior to version 2024.2.0, when fetching remote Activity Streams objects, Misskey doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Misskey instance fetch it, if the remote server accepts arbitrary user uploads. The vulnerability allows a threat actor to impersonate and take over an account on a remote server that satisfies all of the following properties: allows the threat actor to register an account; accepts arbitrary user-uploaded documents and places them on the same domain as legitimate Activity Streams actors; and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Version 2024.2.0 contains a patch for the issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-19T19:42:20.688Z

Updated: 2024-08-15T18:36:56.288Z

Reserved: 2024-02-08T22:26:33.513Z

Link: CVE-2024-25636

cve-icon Vulnrichment

Updated: 2024-08-01T23:44:09.892Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-19T20:15:46.077

Modified: 2024-02-20T19:50:53.960

Link: CVE-2024-25636

cve-icon Redhat

No data.