First published: Tue Sep 19 2023(Updated: )
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 4.2.0-beta1 and prior to version 4.2.0-rc2, by crafting specific input, attackers can inject arbitrary data into HTTP requests issued by Mastodon. This can be used to perform confused deputy attacks if the server configuration includes `ALLOWED_PRIVATE_ADDRESSES` to allow access to local exploitable services. Version 4.2.0-rc2 has a patch for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mastodon | =4.2.0-beta1 | |
Mastodon | =4.2.0-beta2 | |
Mastodon | =4.2.0-beta3 | |
Mastodon | =4.2.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42450 is a vulnerability in Mastodon that allows attackers to inject arbitrary data into HTTP requests.
CVE-2023-42450 affects Mastodon versions 4.2.0-beta1 to 4.2.0-rc2.
CVE-2023-42450 has a severity rating of 7.5 out of 10 (high).
Attackers can exploit CVE-2023-42450 by crafting specific input to inject arbitrary data into HTTP requests issued by Mastodon.
To fix CVE-2023-42450, it is recommended to update Mastodon to version 4.2.0-rc2 or later.