CVE-2023-36462
Summary
| CVE | CVE-2023-36462 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-06 20:15:00 UTC |
| Updated | 2023-07-13 19:27:00 UTC |
| Description | Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 2.6.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker can craft a verified profile link using specific formatting to conceal arbitrary parts of the link, enabling it to appear to link to a different URL altogether. The link is visually misleading, but clicking on it will reveal the actual link. This can still be used for phishing, though, similar to IDN homograph attacks. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Joinmastodon | Mastodon | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release v4.0.5 · mastodon/mastodon · GitHub | MISC | github.com | |
| Release v4.1.3 · mastodon/mastodon · GitHub | MISC | github.com | |
| Merge pull request from GHSA-55j9-c3mp-6fcq · mastodon/mastodon@610731b · GitHub | MISC | github.com | |
| Verified profile links can be formatted in a misleading way · Advisory · mastodon/mastodon · GitHub | MISC | github.com | |
| Release v3.5.9 · mastodon/mastodon · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.