CVE-2023-49952

Mastodon 4.1.x before 4.1.17 and 4.2.x before 4.2.9 allows a bypass of rate limiting via a crafted HTTP request header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*

History

07 May 2025, 13:38

Type Values Removed Values Added
CPE cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
References () https://github.com/mastodon/mastodon/security - () https://github.com/mastodon/mastodon/security - Product
References () https://github.com/mastodon/mastodon/security/advisories/GHSA-c2r5-cfqr-c553 - () https://github.com/mastodon/mastodon/security/advisories/GHSA-c2r5-cfqr-c553 - Vendor Advisory
First Time Joinmastodon mastodon
Joinmastodon

19 Nov 2024, 16:35

Type Values Removed Values Added
Summary
  • (es) Mastodon 4.1.x anterior a 4.1.17 y 4.2.x anterior a 4.2.9 permiten eludir la limitación de velocidad a través de un encabezado de solicitud HTTP manipulado específicamente.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-79

18 Nov 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-18 18:15

Updated : 2025-05-07 13:38


NVD link : CVE-2023-49952

Mitre link : CVE-2023-49952

CVE.ORG link : CVE-2023-49952


JSON object : View

Products Affected

joinmastodon

  • mastodon
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')