![]() The vulnerability allows a threat actor to impersonate and take over an account on a remote server that satisfies all of the following properties: allows the threat actor to register an account accepts arbitrary user-uploaded documents and places them on the same domain as legitimate Activity Streams actors and serves user-uploaded document in response to requests with an `Accept` header value of the Activity Streams media type. Prior to version 2024.2.0, when fetching remote Activity Streams objects, Misskey doesn't check that the response from the remote server has a `Content-Type` header value of the Activity Streams media type, which allows a threat actor to upload a crafted Activity Streams document to a remote server and make a Misskey instance fetch it, if the remote server accepts arbitrary user uploads. Misskey is an open source, decentralized social media platform with ActivityPub support. After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded. ![]() ![]() It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |