Misskey is an open source, decentralized microblogging platform. In affected versions a Server-Side Request Forgery vulnerability exists in "Upload from URL" and remote attachment handling. This could result in the disclosure of non-public information within the internal network. This has been fixed in 12.90.0. However, if you are using a proxy, you will need to take additional measures. As a workaround this exploit may be avoided by appropriately restricting access to private networks from the host where the application is running.
References
Link | Resource |
---|---|
https://github.com/misskey-dev/misskey/security/advisories/GHSA-mqv7-gxh4-r5vf | Issue Tracking Patch Third Party Advisory |
https://github.com/misskey-dev/misskey/commit/e1a8b158e04ad567d92d8daf3cc0898ee18f1a2e | Patch Third Party Advisory |
https://github.com/misskey-dev/misskey/blob/develop/CHANGELOG.md#12900-20210904 | Release Notes Third Party Advisory |
Configurations
Information
Published : 2021-09-07 12:15
Updated : 2021-09-14 09:20
NVD link : CVE-2021-39195
Mitre link : CVE-2021-39195
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
misskey
- misskey