CVE-2023-42452
19.09.2023, 16:15
Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.x branch prior to versions 4.0.10, 4.2.8, and 4.2.0-rc2, under certain conditions, attackers can abuse the translation feature to bypass the server-side HTML sanitization, allowing unescaped HTML to execute in the browser. The impact is limited thanks to Mastodon's strict Content Security Policy, blocking inline scripts, etc. However a CSP bypass or loophole could be exploited to execute malicious XSS. Furthermore, it requires user interaction, as this can only occur upon clicking the Translate button on a malicious post. Versions 4.0.10, 4.2.8, and 4.2.0-rc2 contain a patch for this issue.
Vendor | Product | Version |
---|---|---|
joinmastodon | mastodon | 4.0.0 ≤ 𝑥 < 4.0.10 |
joinmastodon | mastodon | 4.1.0 ≤ 𝑥 < 4.1.8 |
joinmastodon | mastodon | 4.2.0:beta1 |
joinmastodon | mastodon | 4.2.0:beta2 |
joinmastodon | mastodon | 4.2.0:beta3 |
joinmastodon | mastodon | 4.2.0:rc1 |
𝑥
= Vulnerable software versions
References