Vulnerability Description
Misskey is an open source, decentralized social media platform. In versions prior to 13.3.3 SQL injection is possible due to insufficient parameter validation in the note search API by tag (notes/search-by-tag). This has been fixed in version 13.3.3. Users are advised to upgrade. Users unable to upgrade should block access to the `api/notes/search-by-tag` endpoint.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Misskey | Misskey | < 13.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/misskey-dev/misskey/commit/ee74df68233adcd5b167258c621565f97cPatch
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-cgwp-vmr4-wx4qVendor Advisory
- https://github.com/misskey-dev/misskey/commit/ee74df68233adcd5b167258c621565f97cPatch
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-cgwp-vmr4-wx4qVendor Advisory
FAQ
What is CVE-2023-24812?
CVE-2023-24812 is a vulnerability with a CVSS score of 8.8 (HIGH). Misskey is an open source, decentralized social media platform. In versions prior to 13.3.3 SQL injection is possible due to insufficient parameter validation in the note search API by tag (notes/sear...
How severe is CVE-2023-24812?
CVE-2023-24812 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24812?
Check the references section above for vendor advisories and patch information. Affected products include: Misskey Misskey.