{"api_version":"1","generated_at":"2026-04-23T01:32:55+00:00","cve":"CVE-2023-36461","urls":{"html":"https://cve.report/CVE-2023-36461","api":"https://cve.report/api/cve/CVE-2023-36461.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-36461","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-36461"},"summary":{"title":"CVE-2023-36461","description":"Mastodon is a free, open-source social network server based on ActivityPub. When performing outgoing HTTP queries, Mastodon sets a timeout on individual read operations. Prior to versions 3.5.9, 4.0.5, and 4.1.3, a malicious server can indefinitely extend the duration of the response through slowloris-type attacks. This vulnerability can be used to keep all Mastodon workers busy for an extended duration of time, leading to the server becoming unresponsive. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-07-06 19:15:00","updated_at":"2023-07-14 19:25:00"},"problem_types":["CWE-770"],"metrics":[],"references":[{"url":"https://github.com/mastodon/mastodon/releases/tag/v4.0.5","name":"https://github.com/mastodon/mastodon/releases/tag/v4.0.5","refsource":"MISC","tags":[],"title":"Release v4.0.5 · mastodon/mastodon · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mastodon/mastodon/releases/tag/v4.1.3","name":"https://github.com/mastodon/mastodon/releases/tag/v4.1.3","refsource":"MISC","tags":[],"title":"Release v4.1.3 · mastodon/mastodon · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mastodon/mastodon/commit/c5929798bf7e56cc2c79b15bed0c4692ded3dcb6","name":"https://github.com/mastodon/mastodon/commit/c5929798bf7e56cc2c79b15bed0c4692ded3dcb6","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-9pxv-6qvf-pjwc · mastodon/mastodon@c592979 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/mastodon/mastodon/releases/tag/v3.5.9","name":"https://github.com/mastodon/mastodon/releases/tag/v3.5.9","refsource":"MISC","tags":[],"title":"Release v3.5.9 · mastodon/mastodon · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mastodon/mastodon/security/advisories/GHSA-9pxv-6qvf-pjwc","name":"https://github.com/mastodon/mastodon/security/advisories/GHSA-9pxv-6qvf-pjwc","refsource":"MISC","tags":[],"title":"Denial of Service through slow HTTP responses · Advisory · mastodon/mastodon · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/06/7","name":"http://www.openwall.com/lists/oss-security/2023/07/06/7","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-36461: mastodon: Denial of Service through slow HTTP\n responses","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-36461","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36461","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"36461","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"joinmastodon","cpe5":"mastodon","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-36461","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Mastodon is a free, open-source social network server based on ActivityPub. When performing outgoing HTTP queries, Mastodon sets a timeout on individual read operations. Prior to versions 3.5.9, 4.0.5, and 4.1.3, a malicious server can indefinitely extend the duration of the response through slowloris-type attacks. This vulnerability can be used to keep all Mastodon workers busy for an extended duration of time, leading to the server becoming unresponsive. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-770: Allocation of Resources Without Limits or Throttling","cweId":"CWE-770"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"mastodon","product":{"product_data":[{"product_name":"mastodon","version":{"version_data":[{"version_affected":"=","version_value":"< 3.5.9"},{"version_affected":"=","version_value":">= 4.0.0, < 4.0.5"},{"version_affected":"=","version_value":">= 4.1.0, < 4.1.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/mastodon/mastodon/security/advisories/GHSA-9pxv-6qvf-pjwc","refsource":"MISC","name":"https://github.com/mastodon/mastodon/security/advisories/GHSA-9pxv-6qvf-pjwc"},{"url":"https://github.com/mastodon/mastodon/commit/c5929798bf7e56cc2c79b15bed0c4692ded3dcb6","refsource":"MISC","name":"https://github.com/mastodon/mastodon/commit/c5929798bf7e56cc2c79b15bed0c4692ded3dcb6"},{"url":"https://github.com/mastodon/mastodon/releases/tag/v3.5.9","refsource":"MISC","name":"https://github.com/mastodon/mastodon/releases/tag/v3.5.9"},{"url":"https://github.com/mastodon/mastodon/releases/tag/v4.0.5","refsource":"MISC","name":"https://github.com/mastodon/mastodon/releases/tag/v4.0.5"},{"url":"https://github.com/mastodon/mastodon/releases/tag/v4.1.3","refsource":"MISC","name":"https://github.com/mastodon/mastodon/releases/tag/v4.1.3"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/06/7","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/06/7"}]},"source":{"advisory":"GHSA-9pxv-6qvf-pjwc","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-06 19:15:00","lastModifiedDate":"2023-07-14 19:25:00","problem_types":["CWE-770"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1.0","versionEndExcluding":"4.1.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}