CVE-2023-52139

9.0 CRITICAL

📋 TL;DR

This vulnerability in Misskey allows third-party applications to access endpoints or Websocket APIs without proper user permission due to incorrect 'kind' or 'secure' specifications. It enables unauthorized operations like reading/adding non-public content, potentially leaking sensitive information (admin secrets, SMTP passwords) or allowing general users to create invitation codes and access private user data. All Misskey instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Misskey
Versions: All versions before 2023.12.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Misskey deployments with third-party application functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials and sensitive configuration secrets (object storage keys, SMTP passwords) are exposed, leading to complete system compromise, data exfiltration, and unauthorized administrative actions.

🟠

Likely Case

Unauthorized access to non-public user information, creation of invitation codes without permission, and potential exposure of some sensitive data depending on user permissions.

🟢

If Mitigated

Limited impact with proper network segmentation and minimal third-party application usage, but still presents authorization bypass risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to authenticate a third-party application, but once authenticated, the bypass is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.12.1

Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm

Restart Required: Yes

Instructions:

1. Backup your Misskey instance. 2. Update to version 2023.12.1 or later using your deployment method (Docker, manual, etc.). 3. Restart the Misskey service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Third-Party Applications

all

Temporarily disable third-party application functionality to prevent exploitation.

Edit configuration to disable third-party apps or restrict access

🧯 If You Can't Patch

  • Restrict network access to Misskey instance and limit third-party application usage.
  • Implement strict monitoring for unauthorized API calls and review third-party application permissions.

🔍 How to Verify

Check if Vulnerable:

Check your Misskey version - if it's earlier than 2023.12.1, you are vulnerable.

Check Version:

Check Misskey admin panel or deployment configuration for version number.

Verify Fix Applied:

Confirm version is 2023.12.1 or later and test third-party application permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API endpoint access from third-party applications
  • Unexpected invitation code creation
  • Access to admin-only endpoints from non-admin contexts

Network Indicators:

  • Unusual API call patterns from authenticated third-party applications

SIEM Query:

Search for API calls to sensitive endpoints from third-party application user agents.

🔗 References

📤 Share & Export