CVE-2025-24900 (GCVE-0-2025-24900)

Vulnerability from cvelistv5 – Published: 2025-02-11 15:36 – Updated: 2025-02-11 16:09
VLAI?
Title
Concorde CSRF vulnerability due to insecure configuration of authentication cookie attributes
Summary
Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity. The affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating.
CWE
  • CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
Impacted products
Vendor Product Version
nexryai concorde Affected: < 12.25Q1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-24900",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-11T16:08:56.307173Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-11T16:09:43.878Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "concorde",
          "vendor": "nexryai",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 12.25Q1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.\nThe affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352: Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-11T15:38:37.086Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87"
        },
        {
          "name": "https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d"
        },
        {
          "name": "https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059"
        }
      ],
      "source": {
        "advisory": "GHSA-5hgq-9vw8-7v87",
        "discovery": "UNKNOWN"
      },
      "title": "Concorde CSRF vulnerability due to insecure configuration of authentication cookie attributes"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-24900",
    "datePublished": "2025-02-11T15:36:16.868Z",
    "dateReserved": "2025-01-27T15:32:29.453Z",
    "dateUpdated": "2025-02-11T16:09:43.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-24900\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-02-11T16:15:51.763\",\"lastModified\":\"2025-02-11T16:15:51.763\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.\\nThe affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating.\"},{\"lang\":\"es\",\"value\":\"Concorde, anteriormente conocida como Nexkey, es una bifurcaci\u00f3n de la plataforma de microblogging federada Misskey. Debido a la falta de contramedidas CSRF y a una configuraci\u00f3n incorrecta de las cookies para la autenticaci\u00f3n de MediaProxy, existe una vulnerabilidad que permite eludir la autenticaci\u00f3n de MediaProxy. En versiones anteriores a 12.25Q1.1, la cookie de autenticaci\u00f3n no tiene el atributo SameSite. Esto permite a un atacante eludir la autenticaci\u00f3n de MediaProxy y cargar cualquier imagen sin restricciones en determinadas circunstancias. En versiones anteriores a 12.24Q2.3, esta cookie tambi\u00e9n se utilizaba para autenticar la p\u00e1gina de gesti\u00f3n de la cola de trabajos (bull-board), por lo que tambi\u00e9n se elude la autenticaci\u00f3n bull-board. Esto puede permitir ataques que tengan un impacto significativo en la disponibilidad y la integridad. Las versiones afectadas son demasiado antiguas para estar cubiertas por este aviso, pero los encargados del mantenimiento de Concorde recomiendan encarecidamente no utilizar versiones anteriores. La versi\u00f3n 12.25Q1.1 contiene un parche. No existe un workaround eficaz aparte de actualizar.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"references\":[{\"url\":\"https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24900\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T16:08:56.307173Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T16:09:23.287Z\"}}], \"cna\": {\"title\": \"Concorde CSRF vulnerability due to insecure configuration of authentication cookie attributes\", \"source\": {\"advisory\": \"GHSA-5hgq-9vw8-7v87\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"nexryai\", \"product\": \"concorde\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 12.25Q1.1\"}]}], \"references\": [{\"url\": \"https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87\", \"name\": \"https://github.com/nexryai/concorde/security/advisories/GHSA-5hgq-9vw8-7v87\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d\", \"name\": \"https://github.com/nexryai/concorde/commit/2309b4a292828ddba4d57cf0e914bc433095871d\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059\", \"name\": \"https://github.com/nexryai/concorde/commit/f3f54bde6a37ad310f83ae46de54a286c4b74059\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Due to a lack of CSRF countermeasures and improper settings of cookies for MediaProxy authentication, there is a vulnerability that allows MediaProxy authentication to be bypassed. In versions prior to 12.25Q1.1, the authentication cookie does not have the SameSite attribute. This allows an attacker to bypass MediaProxy authentication and load any image without restrictions under certain circumstances. In versions prior to 12.24Q2.3, this cookie was also used to authenticate the job queue management page (bull-board), so bull-board authentication is also bypassed. This may enable attacks that have a significant impact on availability and integrity.\\nThe affected versions are too old to be covered by this advisory, but the maintainers of Concorde strongly recommend not using older versions. Version 12.25Q1.1 contains a patch. There is no effective workaround other than updating.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-352\", \"description\": \"CWE-352: Cross-Site Request Forgery (CSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-02-11T15:38:37.086Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-24900\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-11T16:09:43.878Z\", \"dateReserved\": \"2025-01-27T15:32:29.453Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-02-11T15:36:16.868Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…