First published: Tue Sep 19 2023(Updated: )
Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.x branch prior to versions 4.0.10, 4.2.8, and 4.2.0-rc2, under certain conditions, attackers can abuse the translation feature to bypass the server-side HTML sanitization, allowing unescaped HTML to execute in the browser. The impact is limited thanks to Mastodon's strict Content Security Policy, blocking inline scripts, etc. However a CSP bypass or loophole could be exploited to execute malicious XSS. Furthermore, it requires user interaction, as this can only occur upon clicking the “Translate” button on a malicious post. Versions 4.0.10, 4.2.8, and 4.2.0-rc2 contain a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mastodon | >=4.0.0<4.0.10 | |
Mastodon | >=4.1.0<4.1.8 | |
Mastodon | =4.2.0-beta1 | |
Mastodon | =4.2.0-beta2 | |
Mastodon | =4.2.0-beta3 | |
Mastodon | =4.2.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42452 is a vulnerability in the Mastodon social network server that allows attackers to bypass server-side HTML sanitization.
The severity of CVE-2023-42452 is medium with a score of 5.4.
CVE-2023-42452 affects Mastodon versions on the 4.x branch prior to versions 4.0.10, 4.2.8, and 4.2.0-rc2.
Attackers can abuse the translation feature in affected versions of Mastodon to bypass HTML sanitization and execute unescaped HTML.
To fix CVE-2023-42452, it is recommended to update Mastodon to versions 4.0.10, 4.2.8, or 4.2.0-rc2 or later.