Mastodon 4.2.x < 4.2.9 Multiples Vulnerabilities

medium Web App Scanning Plugin ID 114475

Synopsis

Mastodon 4.2.x < 4.2.9 Multiples Vulnerabilities

Description

According to its self-reported version number, the Mastodon application running on the remote host is prior to 4.1.17 or 4.2.x prior to 4.2.9. It is, therefore, affected by multiples vulnerabilities :

- Private mention filtering can be bypassed - Missing rate-limit to password change endpoint - Bypassing rate limiting with X-Forwarded-For header

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Mastodon version 4.2.9 or later.

See Also

https://github.com/mastodon/mastodon/security/advisories/GHSA-5fq7-3p3j-9vrf

https://github.com/mastodon/mastodon/security/advisories/GHSA-c2r5-cfqr-c553

https://github.com/mastodon/mastodon/security/advisories/GHSA-q3rg-xx5v-4mxh

Plugin Details

Severity: Medium

ID: 114475

Type: remote

Published: 11/5/2024

Updated: 11/5/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 5/30/2024

Vulnerability Publication Date: 5/30/2024

Reference Information

CVE: CVE-2023-49952