CVE-2024-52590
📋 TL;DR
This vulnerability in Misskey allows attackers to create fake user profiles that appear to belong to different federated instances, enabling impersonation of legitimate users. Attackers can fully control these spoofed accounts to post content and interact as if they were real users. All Misskey instances running affected versions are vulnerable to this cross-instance impersonation attack.
💻 Affected Systems
- Misskey
📦 What is this software?
Misskey by Misskey
Misskey by Misskey
Misskey by Misskey
Misskey by Misskey
Misskey by Misskey
Misskey by Misskey
Misskey by Misskey
⚠️ Risk & Real-World Impact
Worst Case
Widespread impersonation campaigns where attackers control fake accounts appearing as legitimate users from trusted instances, leading to misinformation, social engineering attacks, and reputational damage across the federated network.
Likely Case
Targeted impersonation of specific users for harassment, spreading false information, or gaining unauthorized access to private conversations and communities.
If Mitigated
Limited impact with proper monitoring and user education, though the fundamental trust in federated identity remains compromised until patched.
🎯 Exploit Status
The vulnerability is in the federation protocol and requires no authentication to exploit against vulnerable instances.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024.11.0-alpha.3
Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-7vgr-p3vc-p4h2
Restart Required: Yes
Instructions:
1. Backup your Misskey instance data. 2. Update Misskey to version 2024.11.0-alpha.3 or later using your deployment method (Docker, manual, etc.). 3. Restart the Misskey service. 4. Verify the update was successful.
🧯 If You Can't Patch
- Isolate the Misskey instance from the federated network (disable federation features)
- Implement strict monitoring for suspicious account creation and impersonation patterns
🔍 How to Verify
Check if Vulnerable:
Check your Misskey version - if it's earlier than 2024.11.0-alpha.3, you are vulnerable.
Check Version:
Check the Misskey admin panel or run: cat /path/to/misskey/package.json | grep version
Verify Fix Applied:
Confirm your Misskey version is 2024.11.0-alpha.3 or later and test that user validation from federated instances is properly enforced.
📡 Detection & Monitoring
Log Indicators:
- Unusual user creation patterns from unexpected instances
- Multiple accounts appearing to be from the same external instance with similar creation times
- User complaints about impersonation
Network Indicators:
- Unusual federation traffic patterns
- Requests to ApRequestService.signedGet endpoint with suspicious parameters
SIEM Query:
source="misskey" AND (event="user_creation" AND instance!="expected_domain") OR (event="federation_request" AND endpoint="signedGet")