Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <ZKc+hwsLvLmZeYZB@netmeister.org>
Date: Thu, 6 Jul 2023 18:21:59 -0400
From: Jan Schaumann <jschauma@...meister.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-36460: mastodon: Arbitrary file creation through media
 attachments

(I have no affiliation with the project, but posting
this here because it seems to me that increasingly
non-packaged / GitHub distributed projects tend not to
send out announcements here.)

https://github.com/mastodon/mastodon/security/advisories/GHSA-9928-3cp5-93fm

(This advisory describes an issue found by Cure53 as
part of an audit performed at Mozilla's request)

Using carefully crafted media files, attackers can
cause Mastodon's media processing code to create
arbitrary files at any location.

Impact
This allows attackers to create and overwrite any file
Mastodon has access to, allowing Denial of Service and
arbitrary Remote Code Execution.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Severity: 9.9/10

CVE-2023-36460

Affected versions: >= 3.5.0
Patched versions:  4.1.3, 4.0.5, 3.5.9

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.