Skip to content

Server-side request forgery

Moderate
renchap published GHSA-hcqf-fw2r-52g4 Sep 19, 2023

Package

No package listed

Affected versions

>= 4.2.0-beta1, < 4.2.0-rc2

Patched versions

4.2.0-rc2

Description

Summary

By crafting specific input, attackers can inject arbitrary data into HTTP requests issued by Mastodon.

Found and reported by Gabriel Campana

Details

Pre-releases of Mastodon 4.2.0 up to 4.2.0-rc1 performed insufficient validation and escaping of URL path components,
Incorrect URL normalization, allowing arbitrary headers injection and HTTP request splitting.

Impact

This can be used to perform confused deputy attacks if the server configuration includes ALLOWED_PRIVATE_ADDRESSES to allow access to local exploitable services.

Severity

Moderate
5.4
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

CVE ID

CVE-2023-42450

Weaknesses

Credits