Awaiting Analysis
This vulnerability is presently awaiting analysis.
Description
Mastodon is simply a free, open-source societal web server based connected ActivityPub. In versions connected the 4.x subdivision anterior to versions 4.0.10, 4.2.8, and 4.2.0-rc2, nether definite conditions, attackers tin maltreatment the translation diagnostic to bypass the server-side HTML sanitization, allowing unescaped HTML to execute palmy the browser. The enactment is constricted acknowledgment to Mastodon's strict Content Security Policy, blocking inline scripts, etc. However a CSP bypass oregon loophole could beryllium exploited to execute malicious XSS. Furthermore, it requires idiosyncratic interaction, arsenic this tin lone hap upon clicking the “Translate” fastener connected a malicious post. Versions 4.0.10, 4.2.8, and 4.2.0-rc2 incorporated a spot for this issue.
Severity
CVSS 3.x Severity and Metrics:
CNA: GitHub, Inc.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the information that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].
Weakness Enumeration
CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Change History
0 alteration records recovered show changes