Mastodon is a free, open-source social network server based on ActivityPub. When an OAuth Application is destroyed, the streaming server wasn't being informed that the Access Tokens had also been destroyed, this could have posed security risks to users by allowing an application to continue listening to streaming after the application had been destroyed. Essentially this comes down to the fact that when Doorkeeper sets up the relationship between Applications and Access Tokens, it uses a `dependent: delete_all` configuration, which means the `after_commit` callback setup on `AccessTokenExtension` didn't actually fire, since `delete_all` doesn't trigger ActiveRecord callbacks. To mitigate, we need to add a `before_destroy` callback to `ApplicationExtension` which announces to streaming that all the Application's Access Tokens are being "killed". Impact should be negligible given the affected application had to be owned by the user. None the less this issue has been addressed in versions 4.2.6, 4.1.14, 4.0.14, and 3.5.18. Users are advised to upgrade. There are no known workaround for this vulnerability.
History

Wed, 18 Dec 2024 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Joinmastodon
Joinmastodon mastodon
CPEs cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
Vendors & Products Joinmastodon
Joinmastodon mastodon

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-14T20:50:10.809Z

Updated: 2024-08-01T23:44:09.688Z

Reserved: 2024-02-08T22:26:33.511Z

Link: CVE-2024-25619

cve-icon Vulnrichment

Updated: 2024-08-01T23:44:09.688Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-14T21:15:08.620

Modified: 2024-12-18T22:22:01.737

Link: CVE-2024-25619

cve-icon Redhat

No data.