CVE-2023-43805

7.5 HIGH

📋 TL;DR

CVE-2023-43805 is an authentication bypass vulnerability in Nexkey (a Misskey fork) that allows attackers to access the job queue dashboard without proper credentials. This affects all Nexkey instances running versions prior to 12.121.9. The vulnerability stems from incomplete URL validation that can be exploited to bypass authentication mechanisms.

💻 Affected Systems

Products:
  • Nexkey
Versions: All versions prior to 12.121.9
Operating Systems: Any OS running Nexkey
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Nexkey instances with the job queue dashboard enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the job queue dashboard, potentially allowing them to manipulate background jobs, execute arbitrary commands, or access sensitive system information.

🟠

Likely Case

Unauthorized users access the job queue dashboard to view sensitive job information, monitor system activities, or potentially manipulate queued jobs.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific job queue dashboard functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves URL manipulation to bypass authentication, which is typically straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.121.9

Vendor Advisory: https://github.com/nexryai/nexkey/security/advisories/GHSA-g8w5-568f-ffwf

Restart Required: Yes

Instructions:

1. Backup your Nexkey instance. 2. Update to version 12.121.9 or later using your package manager or by pulling the latest code from the repository. 3. Restart the Nexkey service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to the job queue dashboard using firewall rules or WAF.

iptables -A INPUT -p tcp --dport [NEXKEY_PORT] -s ! [TRUSTED_NETWORK] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Nexkey instance
  • Use a WAF (like Cloudflare's) to block malicious requests targeting the job queue endpoint

🔍 How to Verify

Check if Vulnerable:

Check if your Nexkey version is below 12.121.9 by accessing the admin panel or checking the package version.

Check Version:

Check the version in the admin dashboard or run: cat package.json | grep version

Verify Fix Applied:

After updating to 12.121.9 or later, attempt to access the job queue dashboard without authentication - access should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /api/jobs/queue or similar job-related endpoints
  • Failed authentication logs followed by successful job queue access

Network Indicators:

  • Unusual traffic patterns to job queue endpoints from unauthenticated sources

SIEM Query:

source="nexkey.logs" AND (uri_path="/api/jobs/*" OR uri_path="/admin/jobs/*") AND http_status=200 AND auth_status="failed"

🔗 References

📤 Share & Export