Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 3.5.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, attackers using carefully crafted media files can cause Mastodon's media processing code to create arbitrary files at any location. This allows attackers to create and overwrite any file Mastodon has access to, allowing Denial of Service and arbitrary Remote Code Execution. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/07/06/4 | Mailing List |
https://github.com/mastodon/mastodon/commit/dc8f1fbd976ae544720a4e07120d9a91b2722440 | Patch Third Party Advisory |
https://github.com/mastodon/mastodon/releases/tag/v3.5.9 | Third Party Advisory |
https://github.com/mastodon/mastodon/releases/tag/v4.0.5 | Third Party Advisory |
https://github.com/mastodon/mastodon/releases/tag/v4.1.3 | Third Party Advisory |
https://github.com/mastodon/mastodon/security/advisories/GHSA-9928-3cp5-93fm | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-07-06 19:15
Updated : 2023-07-14 19:31
NVD link : CVE-2023-36460
Mitre link : CVE-2023-36460
CVE.ORG link : CVE-2023-36460
JSON object : View
Products Affected
joinmastodon
- mastodon
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')