CVE-2024-52591

9.3 CRITICAL

📋 TL;DR

This vulnerability in Misskey allows attackers to create fake user profiles and forged notes that appear to originate from different instances or users. Attackers can fully control these spoofed objects to impersonate legitimate users and instances. All Misskey instances running affected versions are vulnerable to this identity spoofing attack.

💻 Affected Systems

Products:
  • Misskey
Versions: All versions before 2024.11.0-alpha.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Misskey instances with default configurations are vulnerable. The vulnerability affects the ActivityPub federation protocol implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could impersonate administrators or trusted users to spread misinformation, manipulate community discussions, conduct social engineering attacks, or damage the reputation of legitimate instances.

🟠

Likely Case

Attackers create fake accounts impersonating real users to post misleading content, harass users, or manipulate federated social interactions across instances.

🟢

If Mitigated

With proper monitoring and user education, administrators could detect suspicious account behavior, but the fundamental trust in user identities would remain compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted ActivityPub objects to vulnerable endpoints. No authentication is required to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.11.0-alpha.3

Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-m2gq-69fp-6hv4

Restart Required: Yes

Instructions:

1. Backup your Misskey instance data. 2. Update Misskey to version 2024.11.0-alpha.3 or later. 3. Restart the Misskey service. 4. Verify the update was successful.

🧯 If You Can't Patch

  • Isolate the Misskey instance from the internet if possible
  • Implement strict monitoring for unusual account creation or posting patterns

🔍 How to Verify

Check if Vulnerable:

Check your Misskey version. If it's earlier than 2024.11.0-alpha.3, you are vulnerable.

Check Version:

Check the Misskey admin panel or run: cat /path/to/misskey/package.json | grep version

Verify Fix Applied:

Verify the version is 2024.11.0-alpha.3 or later and test that the instance properly validates ActivityPub signatures.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ActivityPub requests to ApRequestService or HttpRequestService endpoints
  • Multiple account creations from unexpected instances
  • Posts appearing from users that don't exist locally

Network Indicators:

  • Incoming ActivityPub objects with mismatched signatures or origins
  • Suspicious federation requests

SIEM Query:

source="misskey" AND ("ApRequestService" OR "HttpRequestService") AND ("validation" OR "signature")

🔗 References

📤 Share & Export