Awaiting Analysis
This vulnerability is presently awaiting analysis.
Description
Mastodon is simply a free, open-source societal web server based connected ActivityPub. Starting successful mentation 4.2.0-beta1 and anterior to mentation 4.2.0-rc2, by crafting circumstantial input, attackers tin inject arbitrary information into HTTP requests issued by Mastodon. This tin beryllium utilized to execute confused lawman attacks if the server configuration includes `ALLOWED_PRIVATE_ADDRESSES` to let entree to section exploitable services. Version 4.2.0-rc2 has a spot for the issue.
Severity
CVSS 3.x Severity and Metrics:
CNA: GitHub, Inc.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].
Weakness Enumeration
CWE-918 | Server-Side Request Forgery (SSRF) |
|
Change History
0 alteration records recovered show changes