Vulnerability Description
Misskey is an open source, decentralized microblogging platform. Misskey doesn't perform proper normalization on the JSON structures of incoming signed ActivityPub activity objects before processing them, allowing threat actors to spoof the contents of signed activities and impersonate the authors of the original activities. This vulnerability is fixed in 2024.5.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Misskey | Misskey | < 2024.5.0 |
Related Weaknesses (CWE)
References
- https://github.com/misskey-dev/misskey/commit/d2a5bb39e344fcb84a24ae60faafe4694bPatch
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-2vxv-pv3m-3wvjExploitVendor Advisory
- https://github.com/misskey-dev/misskey/commit/d2a5bb39e344fcb84a24ae60faafe4694bPatch
- https://github.com/misskey-dev/misskey/security/advisories/GHSA-2vxv-pv3m-3wvjExploitVendor Advisory
FAQ
What is CVE-2024-32983?
CVE-2024-32983 is a vulnerability with a CVSS score of 8.2 (HIGH). Misskey is an open source, decentralized microblogging platform. Misskey doesn't perform proper normalization on the JSON structures of incoming signed ActivityPub activity objects before processing t...
How severe is CVE-2024-32983?
CVE-2024-32983 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-32983?
Check the references section above for vendor advisories and patch information. Affected products include: Misskey Misskey.