First published: Thu Jul 06 2023(Updated: )
Mastodon is a free, open-source social network server based on ActivityPub. When performing outgoing HTTP queries, Mastodon sets a timeout on individual read operations. Prior to versions 3.5.9, 4.0.5, and 4.1.3, a malicious server can indefinitely extend the duration of the response through slowloris-type attacks. This vulnerability can be used to keep all Mastodon workers busy for an extended duration of time, leading to the server becoming unresponsive. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mastodon | <3.5.9 | |
Mastodon | >=4.0.0<4.0.5 | |
Mastodon | >=4.1.0<4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36461 is a vulnerability in Mastodon, an open-source social network server, that allows a malicious server to indefinitely extend the duration of a response through slowloris attacks.
The vulnerability in Mastodon occurs when performing outgoing HTTP queries, allowing a malicious server to indefinitely extend the duration of the response by using slowloris attacks.
CVE-2023-36461 has a severity rating of 7.5, which is considered high.
Mastodon versions up to and excluding 3.5.9, versions between 4.0.0 and 4.0.5 (exclusive), and versions between 4.1.0 and 4.1.3 (exclusive) are affected by CVE-2023-36461.
To fix the CVE-2023-36461 vulnerability in Mastodon, you should upgrade to versions 3.5.9, 4.0.5, or 4.1.3 or later.