CVE-2024-52590

6.5 MEDIUM

📋 TL;DR

This vulnerability in Misskey allows attackers to create fake user profiles that appear to belong to different federated instances, enabling impersonation of legitimate users. Attackers can fully control these spoofed accounts to post content and interact as if they were real users. All Misskey instances running affected versions are vulnerable to this cross-instance impersonation attack.

💻 Affected Systems

Products:
  • Misskey
Versions: All versions before 2024.11.0-alpha.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Misskey instances in federated networks are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Widespread impersonation campaigns where attackers control fake accounts appearing as legitimate users from trusted instances, leading to misinformation, social engineering attacks, and reputational damage across the federated network.

🟠

Likely Case

Targeted impersonation of specific users for harassment, spreading false information, or gaining unauthorized access to private conversations and communities.

🟢

If Mitigated

Limited impact with proper monitoring and user education, though the fundamental trust in federated identity remains compromised until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the federation protocol and requires no authentication to exploit against vulnerable instances.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.11.0-alpha.3

Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-7vgr-p3vc-p4h2

Restart Required: Yes

Instructions:

1. Backup your Misskey instance data. 2. Update Misskey to version 2024.11.0-alpha.3 or later using your deployment method (Docker, manual, etc.). 3. Restart the Misskey service. 4. Verify the update was successful.

🧯 If You Can't Patch

  • Isolate the Misskey instance from the federated network (disable federation features)
  • Implement strict monitoring for suspicious account creation and impersonation patterns

🔍 How to Verify

Check if Vulnerable:

Check your Misskey version - if it's earlier than 2024.11.0-alpha.3, you are vulnerable.

Check Version:

Check the Misskey admin panel or run: cat /path/to/misskey/package.json | grep version

Verify Fix Applied:

Confirm your Misskey version is 2024.11.0-alpha.3 or later and test that user validation from federated instances is properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user creation patterns from unexpected instances
  • Multiple accounts appearing to be from the same external instance with similar creation times
  • User complaints about impersonation

Network Indicators:

  • Unusual federation traffic patterns
  • Requests to ApRequestService.signedGet endpoint with suspicious parameters

SIEM Query:

source="misskey" AND (event="user_creation" AND instance!="expected_domain") OR (event="federation_request" AND endpoint="signedGet")

🔗 References

📤 Share & Export