CVE-2023-43793

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated users to bypass authentication for the Bull dashboard job queue management interface in Misskey by editing URLs. This affects all Misskey instances running versions prior to 2023.9.0. The Bull dashboard provides administrative control over background job processing.

💻 Affected Systems

Products:
  • Misskey
Versions: All versions prior to 2023.9.0
Operating Systems: All platforms running Misskey
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Misskey deployments with Bull dashboard enabled (typically enabled by default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate job queues, delete pending jobs, modify job parameters, or disrupt platform operations, potentially leading to service degradation or data corruption.

🟠

Likely Case

Unauthorized users accessing the job queue dashboard to view sensitive job information, monitor system activity, or interfere with scheduled tasks.

🟢

If Mitigated

With proper authentication controls, only authorized administrators can access job queue management functions.

🌐 Internet-Facing: HIGH - Misskey instances are typically internet-facing social media platforms, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Even internally hosted instances could be compromised if attackers gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only URL manipulation, making it trivial for attackers with basic web knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.9.0

Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-9fj2-gjcf-cqqc

Restart Required: Yes

Instructions:

1. Backup your Misskey instance. 2. Update to version 2023.9.0 or later using your package manager or git pull. 3. Run database migrations if required. 4. Restart the Misskey service.

🔧 Temporary Workarounds

Disable Bull Dashboard

all

Completely disable the Bull dashboard interface to prevent access.

Edit configuration to set 'enableBullDashboard: false' in your Misskey config

Network Access Control

linux

Restrict access to the Bull dashboard port using firewall rules.

iptables -A INPUT -p tcp --dport [BULL_PORT] -j DROP
ufw deny [BULL_PORT]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Bull dashboard from untrusted networks
  • Deploy a web application firewall (WAF) with authentication bypass detection rules

🔍 How to Verify

Check if Vulnerable:

Attempt to access /queue or /bull dashboard endpoints without authentication. If accessible, instance is vulnerable.

Check Version:

Check package.json or run: node -e "console.log(require('./package.json').version)" in Misskey directory

Verify Fix Applied:

After patching, verify authentication is required for /queue or /bull dashboard endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to /queue/* or /bull/* endpoints
  • Failed authentication attempts followed by successful dashboard access

Network Indicators:

  • HTTP requests to job queue endpoints without authentication headers
  • Unusual traffic patterns to administrative interfaces

SIEM Query:

source="misskey.log" AND (url_path="/queue/*" OR url_path="/bull/*") AND auth_status="unauthenticated" AND response_code=200

🔗 References

📤 Share & Export