Misskey is an open source, decentralized microblogging platform. In affected versions a Server-Side Request Forgery vulnerability exists in "Upload from URL" and remote attachment handling. This could result in the disclosure of non-public information within the internal network. This has been fixed in 12.90.0. However, if you are using a proxy, you will need to take additional measures. As a workaround this exploit may be avoided by appropriately restricting access to private networks from the host where the application is running.
References
Link | Resource |
---|---|
https://github.com/misskey-dev/misskey/blob/develop/CHANGELOG.md#12900-20210904 | Release Notes Third Party Advisory |
https://github.com/misskey-dev/misskey/commit/e1a8b158e04ad567d92d8daf3cc0898ee18f1a2e | Patch Third Party Advisory |
https://github.com/misskey-dev/misskey/security/advisories/GHSA-mqv7-gxh4-r5vf | Issue Tracking Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-09-07T19:00:12
Updated: 2021-09-07T19:00:12
Reserved: 2021-08-16T00:00:00
Link: CVE-2021-39195
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-07T19:15:08.600
Modified: 2021-09-14T16:20:41.183
Link: CVE-2021-39195
JSON object: View
Redhat Information
No data.
CWE