Possible account takeover vulnerability in Mastodon due to external authentication providers
CVE-2024-25618
What is CVE-2024-25618?
Mastodon, a free and open-source social networking server based on the ActivityPub protocol, exposes a vulnerability related to its authentication process. When integrating with external authentication providers such as CAS, SAML, or OIDC, Mastodon permits the formation of new identities linked to existing users sharing the same email address. This configuration could facilitate unauthorized access if an external provider allows users to alter their registered email addresses. In such scenarios, a malicious actor might hijack an account upon the first login using an external provider, as the matching is conducted solely on the email address. The risk is particularly pronounced when using popular OIDC providers that may easily permit unverified email modifications, such as Microsoft Azure. It is recommended that users immediately upgrade to the patched versions, as outlined, to mitigate this emerging security concern.
Affected Version(s)
mastodon >= 4.2.0, < 4.2.6 < 4.2.0, 4.2.6
mastodon >= 4.1.0, < 4.1.14 < 4.1.0, 4.1.14
mastodon >= 4.0.0, < 4.0.14 < 4.0.0, 4.0.14
