ghsa-7899-w6c4-vqc4
Vulnerability from github
Published
2025-05-05 17:03
Modified
2025-05-05 22:06
Severity ?
VLAI Severity ?
Summary
@misskey-dev/summaly Redirect Filter Bypass
Details
Summary
A logic error in the main summaly
function causes the allowRedirects
option to never be passed to any plugins, and as a result, isn't enforced.
Details
In the main summaly
function, a new scrapingOptions
object is created and passed to either the matched plugin, if any, or the default summarize function. The issue here is that the new scrapingOptions
object is not provided the allowRedirects
property of opts
.
PoC
- Publish a post containing a link to any URL that redirects on Misskey.
- A preview will be generated for the target of the redirect, despite Misskey passing
allowRedirects: false
.
Impact
Misskey will follow redirects, despite explicitly requesting not to.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "@misskey-dev/summaly" }, "ranges": [ { "events": [ { "introduced": "3.0.1" }, { "fixed": "5.2.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-46553" ], "database_specific": { "cwe_ids": [ "CWE-601", "CWE-665", "CWE-669", "CWE-693" ], "github_reviewed": true, "github_reviewed_at": "2025-05-05T17:03:20Z", "nvd_published_at": "2025-05-05T19:15:56Z", "severity": "LOW" }, "details": "### Summary\nA logic error in the main `summaly` function causes the `allowRedirects` option to never be passed to any plugins, and as a result, isn\u0027t enforced.\n\n### Details\nIn the main `summaly` function, a new `scrapingOptions` object is created and passed to either the matched plugin, if any, or the default summarize function. The issue here is that the new `scrapingOptions` object is not provided the `allowRedirects` property of `opts`.\n\n### PoC\n- Publish a post containing a link to any URL that redirects on Misskey.\n- A preview will be generated for the target of the redirect, despite Misskey passing `allowRedirects: false`.\n\n### Impact\nMisskey will follow redirects, despite explicitly requesting not to.", "id": "GHSA-7899-w6c4-vqc4", "modified": "2025-05-05T22:06:39Z", "published": "2025-05-05T17:03:20Z", "references": [ { "type": "WEB", "url": "https://github.com/misskey-dev/summaly/security/advisories/GHSA-7899-w6c4-vqc4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46553" }, { "type": "WEB", "url": "https://github.com/misskey-dev/summaly/commit/45153b4f08a772c395a13f7a25399dd87ed022ed" }, { "type": "PACKAGE", "url": "https://github.com/misskey-dev/summaly" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:P", "type": "CVSS_V4" } ], "summary": "@misskey-dev/summaly Redirect Filter Bypass" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…