CVE-2024-52593

5.3 MEDIUM

📋 TL;DR

This vulnerability in Misskey allows attackers to manipulate 'origin' links in notes and user profiles to point to arbitrary HTTPS URLs, even on different domains. This enables phishing attacks where users may be tricked into clicking malicious links. All Misskey instances running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Misskey
Versions: All versions before 2024.11.0-alpha.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Misskey deployments are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Widespread phishing campaigns targeting federated social media users, credential theft, malware distribution through trusted-looking links.

🟠

Likely Case

Targeted phishing attacks against specific users or communities, reputation damage to vulnerable instances.

🟢

If Mitigated

Minimal impact if users are trained to verify URLs before clicking, but phishing risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create notes or modify user profiles, but the vulnerability itself is simple to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.11.0-alpha.3

Vendor Advisory: https://github.com/misskey-dev/misskey/security/advisories/GHSA-675w-hf2m-qwmj

Restart Required: Yes

Instructions:

1. Backup your Misskey instance. 2. Update to version 2024.11.0-alpha.3 or later. 3. Restart the Misskey service. 4. Verify the update was successful.

🧯 If You Can't Patch

  • Implement strict URL filtering at network perimeter to block suspicious domains.
  • Educate users about phishing risks and URL verification.

🔍 How to Verify

Check if Vulnerable:

Check if your Misskey version is earlier than 2024.11.0-alpha.3.

Check Version:

Check Misskey admin panel or package manager for version information.

Verify Fix Applied:

Confirm version is 2024.11.0-alpha.3 or later and test that origin links are properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of note creation or profile updates with external URLs.
  • User reports of suspicious links in notes or profiles.

Network Indicators:

  • Outbound connections to unexpected domains when clicking origin links.

SIEM Query:

Search for: 'NoteCreateService.insertNote' OR 'ApPersonService.createPerson' OR 'ApPersonService.updatePerson' with URL parameters

🔗 References

📤 Share & Export