First published: Thu Jul 06 2023(Updated: )
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 2.6.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker can craft a verified profile link using specific formatting to conceal arbitrary parts of the link, enabling it to appear to link to a different URL altogether. The link is visually misleading, but clicking on it will reveal the actual link. This can still be used for phishing, though, similar to IDN homograph attacks. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mastodon | >=2.6.0<3.5.9 | |
Mastodon | >=4.0.0<4.0.5 | |
Mastodon | >=4.1.0<4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36462 is a vulnerability in Mastodon, a free open-source social network server based on ActivityPub, that allows an attacker to craft a verified profile link using specific formatting to conceal arbitrary parts of the link.
CVE-2023-36462 has a severity score of 5.4, which is considered medium.
Mastodon versions 2.6.0 to 3.5.9, 4.0.0 to 4.0.5, and 4.1.0 to 4.1.3 are affected by CVE-2023-36462.
You can fix CVE-2023-36462 by upgrading your Mastodon server to version 3.5.9, 4.0.5, or 4.1.3.
Yes, you can find more information about CVE-2023-36462 in the GitHub links: [link1](https://github.com/mastodon/mastodon/commit/610731b03dfcadd887078cb0399f4e514aa1931c), [link2](https://github.com/mastodon/mastodon/releases/tag/v3.5.9), [link3](https://github.com/mastodon/mastodon/releases/tag/v4.0.5).