FlameWar
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Arthur Besse@lemmy.ml to Fediverse@lemmy.mlEnglish · 1 year ago

Mastodon security update: every version prior to today's is vulnerable to remote user impersonation and takeover

github.com

external-link
message-square
18
fedilink
  • cross-posted to:
  • fediverse@lemmy.world
190
external-link

Mastodon security update: every version prior to today's is vulnerable to remote user impersonation and takeover

github.com

Arthur Besse@lemmy.ml to Fediverse@lemmy.mlEnglish · 1 year ago
message-square
18
fedilink
  • cross-posted to:
  • fediverse@lemmy.world
Remote user impersonation and takeover
github.com
external-link
### Summary Due to insufficient origin validation in all Mastodon, attackers can impersonate and take over any remote account. Every Mastodon version prior to 3.5.17 is vulnerable, as well as...
alert-triangle
You must log in or register to comment.
  • redcalcium@lemmy.institute
    link
    fedilink
    arrow-up
    30
    arrow-down
    1
    ·
    1 year ago

    This advisory will be edited with more details on 2024/02/15, when admins have been given some time to update, as we think any amount of detail would make it very easy to come up with an exploit.

    But the commit to fix insufficient origin validation is already visible right there in the repo?

    • losttourist@kbin.social
      link
      fedilink
      arrow-up
      31
      ·
      1 year ago

      Without a published POC there’s a slightly longer window before clueless script kiddies start having a go at exploiting the vulnerability, though.

      • fartsparkles@sh.itjust.works
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        Script kiddies aren’t the first ones to take advantage of vulns, threat actors are.

        • jmcs@discuss.tchncs.de
          link
          fedilink
          arrow-up
          8
          ·
          1 year ago

          That doesn’t mean you shouldn’t try to contain the blast radius.

          • fartsparkles@sh.itjust.works
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            1 year ago

            deleted by creator

            • cheviotveneer@sh.itjust.works
              link
              fedilink
              arrow-up
              2
              ·
              1 year ago

              private repo they commit to and build from

              This isn’t possible with Ruby and Mastodon. The only way to distribute the patch is to reveal the changes to the source. FWIW, compiling the fix is still just an obfuscation method, one can still just diff the binaries and see what changed (see: reverse-engineering Windows vulnerabilities in updates).

              At best, you can release it with a bunch of unrelated and obfuscating changes, but putting work into doing that is further delaying simply getting the fix released.

              • fartsparkles@sh.itjust.works
                link
                fedilink
                arrow-up
                1
                arrow-down
                1
                ·
                1 year ago

                deleted by creator

    • pelespirit@sh.itjust.works
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Could you explain what you’re saying in common language?

      • Arthur Besse@lemmy.mlOP
        link
        fedilink
        arrow-up
        23
        ·
        edit-2
        1 year ago

        The lack of details in the advisory is only a minor impediment for a malicious person who wants to figure out how to implement their own exploit for this vulnerability. Anyone can read the patch that fixes it and figure it out.

        TLDR: if you run your own instance, update it ASAP. If an instance you rely on hasn’t updated yet, consider asking its admins to do so. And if they don’t update it soon, you might want to reconsider your choice of instance.

        • elvith@feddit.de
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          And if they don’t update it soon, you might want to reconsider your choice of instance.

          The advisory went up about 4h ago. About 3h ago, my instance admin sent out an announcement that the patch had been applied. That was before I even heard about the issue.

          Nice work :)

        • Fembot@mstdn.social
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          1 year ago

          deleted by creator

          • triplenadir@lemmygrad.ml
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            not the person you’re replying to but yes, anyone on an unpatched server is vulnerable

  • AngieStone 🌳 :polarbear:@mastodon.social
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    @cypherpunks
    German news:
    https://www.heise.de/news/Mastodon-Diebstahl-beliebiger-Identitaeten-im-foederierten-Kurznachrichtendienst-9615961.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

    • androidul@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      nett hier

  • (des)mosthenes@lemmy.world
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    1 year ago

    hope for the best; plan for the worst

  • Steve's Place@mastodon.stevesworld.co
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    @cypherpunks Upgrading went smoothly.

  • Fembot@mstdn.social
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    deleted by creator

  • Atelopus-zeteki@kbin.run
    link
    fedilink
    arrow-up
    2
    arrow-down
    7
    ·
    1 year ago

    Hmm, so if one is on iOS, the current version 2023.16, and is vulnerable. Take note apple / mac folx.

    • Arthur Besse@lemmy.mlOP
      link
      fedilink
      arrow-up
      20
      ·
      1 year ago

      No, this is a server-side vulnerability. Clients do not need to update, instances do.

      • Atelopus-zeteki@kbin.run
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        TY!

Fediverse@lemmy.ml

fediverse@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !fediverse@lemmy.ml

A community dedicated to fediverse news and discussion.

Fediverse is a portmanteau of “federation” and “universe”.

Getting started on Fediverse;

  • What is the fediverse?
    • Short ver.
    • Full ver.
  • Fediverse Platforms
  • How to run your own community
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 422 users / day
  • 449 users / week
  • 716 users / month
  • 3.15K users / 6 months
  • 1 local subscriber
  • 19.5K subscribers
  • 688 Posts
  • 6.86K Comments
  • Modlog
  • mods:
  • Sean Tilley@lemmy.ml
  • wakest@lemmy.ml
  • BE: 0.19.5
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org