Miggo Logo

CVE-2024-23649: Any authenticated user may obtain private message details from other users on the same instance

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.51335%
Published
1/24/2024
Updated
1/24/2024
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lemmy_serverrust>= 0.17.0, < 0.19.10.19.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authorization checks in the private message report creation endpoint. The commit diff shows a critical addition of a recipient validation check in crates/api/src/private_message_report/create.rs, where previously any user could submit reports for any private message ID. The vulnerable function handled the report creation without verifying the reporter's relationship to the message, enabling unauthorized access to private message contents through the API response. The high confidence comes from the explicit security check added in the patch and the CVE description directly linking this endpoint to the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Us*rs **n r*port priv*t* m*ss***s, *v*n w**n t**y'r* n*it**r s*n**r nor r**ipi*nt o* t** m*ss***. T** *PI r*spons* to *r**tin* * priv*t* m*ss*** r*port *ont*ins t** priv*t* m*ss*** its*l*, w*i** m**ns *ny us*r **n just it*r*t* ov*r m*ss**

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut*oriz*tion ****ks in t** priv*t* m*ss*** r*port *r**tion *n*point. T** *ommit *i** s*ows * *riti**l ***ition o* * r**ipi*nt v*li**tion ****k in *r*t*s/*pi/sr*/priv*t*_m*ss***_r*port/*r**t*.rs, w**r* pr*viously