Security News > 2024 > February > Lagging Mastodon admins urged to patch critical account takeover flaw (CVE-2024-23832)
Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability, over 66% of Mastodon servers out there have been upgraded to close the hole.
Mastodon is open-source software for running self-hosted social networking services within the wider Fediverse.
Mastodon users gather on a variety of different servers, run by different people or organizations, which makes the uptake of the latest security updates quite impressive.
"Every Mastodon version prior to 3.5.17 is vulnerable, as well as 4.0.x versions prior to 4.0.13, 4.1.x version prior to 4.1.13, and 4.2.x versions prior to 4.2.5.".
Mastodon server admins have been alerted to the necessity of implementing the critical security update via email and via unmissable prompts in the admin panel, which might explain the satisfactory uptake of security updates.
This is not the first time that a critical, easily exploited vulnerability has been fixed in the Mastodon software.
News URL
https://www.helpnetsecurity.com/2024/02/06/cve-2024-23832/
Related news
- Patch now: Critical Nvidia bug allows container escape, complete host takeover (source)
- PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987) (source)
- Progress urges admins to patch critical WhatsUp Gold bugs ASAP (source)
- Critical flaw in NVIDIA Container Toolkit allows full host takeover (source)
- Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519) (source)
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824) (source)
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits (source)
- Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409) (source)
- VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) (source)