2024-07-14 02:06:08 +00:00

122 lines
4.1 KiB
JSON

{
"id": "CVE-2023-52077",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-27T19:15:07.763",
"lastModified": "2024-01-04T23:11:39.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5."
},
{
"lang": "es",
"value": "Nexkey es una bifurcaci\u00f3n liviana de Misskey v12 optimizada para servidores de tama\u00f1o peque\u00f1o y mediano. Antes de 12.23Q4.5, Nexkey permit\u00eda que aplicaciones externas que utilizaran tokens emitidos por administradores y moderadores llamaran a las API de administraci\u00f3n. Esto permite que aplicaciones maliciosas de terceros realicen operaciones como actualizar la configuraci\u00f3n del servidor, as\u00ed como comprometer el almacenamiento de objetos y las credenciales del servidor de correo electr\u00f3nico. Este problema se solucion\u00f3 en 12.23Q4.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nexryai:nexkey:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "12.23q4.5",
"matchCriteriaId": "FC7AC948-828A-4C9A-9010-FC8BBFDBCFC5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc",
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}