Nexkey is a lightweight fork of Misskey v12 optimized for small to medium size servers. Prior to 12.23Q4.5, Nexkey allows external apps using tokens issued by administrators and moderators to call admin APIs. This allows malicious third-party apps to perform operations such as updating server settings, as well as compromise object storage and email server credentials. This issue has been patched in 12.23Q4.5.
References
Configurations
History
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.9 |
References | () https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c - Patch | |
References | () https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230 - Patch | |
References | () https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98 - Patch | |
References | () https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc - Vendor Advisory |
04 Jan 2024, 23:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nexryai/nexkey/security/advisories/GHSA-pjj7-7hcj-9cpc - Vendor Advisory | |
References | () https://github.com/mei23/misskey-v12/commit/78173e376f14fcc1987b02196f5538bf5b18225c - Patch | |
References | () https://github.com/misskey-dev/misskey/commit/5150053275594278e9eb23e72d98b16593c4c230 - Patch | |
References | () https://github.com/nexryai/nexkey/commit/a4e4c9c47c5f84ec7ccd309bde59d4ae5d7e5a98 - Patch | |
First Time |
Nexryai
Nexryai nexkey |
|
CPE | cpe:2.3:a:nexryai:nexkey:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
27 Dec 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-27 19:15
Updated : 2024-11-21 08:39
NVD link : CVE-2023-52077
Mitre link : CVE-2023-52077
CVE.ORG link : CVE-2023-52077
JSON object : View
Products Affected
nexryai
- nexkey
CWE
CWE-863
Incorrect Authorization