You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Incomplete Patch on CVE-2024-52591 leading to Forgery of Federated Notes
Critical
samunohito
published
GHSA-6w2c-vf6f-xf26Mar 8, 2025
Package
misskey
(github/misskey-dev)
Affected versions
<=2025.2.0
Patched versions
2025.2.1
Description
Summary
The patch for CVE-2024-52591 did not sufficiently validate the relation between the id and url fields of ActivityPub objects. An attacker can forge an object where they claim authority in the url field even if the specific ActivityPub object type require authority in the id field.
The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
Learn more on MITRE.
The code performs a comparison between two entities, but the comparison examines the wrong factors or characteristics of the entities, which can lead to incorrect results and resultant weaknesses.
Learn more on MITRE.
Summary
The patch for CVE-2024-52591 did not sufficiently validate the relation between the
idandurlfields of ActivityPub objects. An attacker can forge an object where they claim authority in theurlfield even if the specific ActivityPub object type require authority in theidfield.