Skip to main content

CVE-2024-23649: CWE-285: Improper Authorization in LemmyNet lemmy

High
VulnerabilityCVE-2024-23649cvecve-2024-23649cwe-285cwe-200
Published: Wed Jan 24 2024 (01/24/2024, 18:09:30 UTC)
Source: CVE Database V5
Vendor/Project: LemmyNet
Product: lemmy

Description

Lemmy is a link aggregator and forum for the fediverse. Starting in version 0.17.0 and prior to version 0.19.1, users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports. Creating a private message report by POSTing to `/api/v3/private_message/report` does not validate whether the reporter is the recipient of the message. lemmy-ui does not allow the sender to report the message; the API method should likely be restricted to accessible to recipients only. The API response when creating a report contains the `private_message_report_view` with all the details of the report, including the private message that has been reported: Any authenticated user can obtain arbitrary (untargeted) private message contents. Privileges required depend on the instance configuration; when registrations are enabled without application system, the privileges required are practically none. When registration applications are required, privileges required could be considered low, but this assessment heavily varies by instance. Version 0.19.1 contains a patch for this issue. A workaround is available. If an update to a fixed Lemmy version is not immediately possible, the API route can be blocked in the reverse proxy. This will prevent anyone from reporting private messages, but it will also prevent exploitation before the update has been applied.

AI-Powered Analysis

AILast updated: 07/08/2025, 19:56:18 UTC

Technical Analysis

CVE-2024-23649 is a high-severity improper authorization vulnerability (CWE-285) affecting LemmyNet's lemmy software versions from 0.17.0 up to but not including 0.19.1. Lemmy is a federated link aggregator and forum platform used in the fediverse. The vulnerability arises because the API endpoint responsible for reporting private messages (/api/v3/private_message/report) does not properly validate whether the user creating the report is authorized to do so—that is, whether they are the sender or recipient of the private message. Consequently, any authenticated user can submit a report for any private message ID, even if they are unrelated to the conversation. The API response to creating such a report includes the full contents of the private message, effectively allowing unauthorized users to enumerate and access all private messages on the instance by iterating over message IDs. This leads to a significant confidentiality breach (CWE-200). The vulnerability is exacerbated by the fact that some Lemmy instances allow open registrations without application approval, meaning an attacker can easily create an account and exploit this flaw without elevated privileges. Even in instances requiring registration approval, the privilege barrier remains low. Instance administrators can also abuse the flaw to view reports and associated private messages. The vulnerability was patched in version 0.19.1. As an interim mitigation, administrators can block the vulnerable API route at the reverse proxy level, which disables private message reporting but prevents exploitation until the patch is applied. The CVSS v3.1 base score is 7.5 (high), reflecting network exploitability without authentication or user interaction, and a high impact on confidentiality with no impact on integrity or availability.

Potential Impact

For European organizations using Lemmy instances—particularly those hosting communities or federated forums—this vulnerability poses a serious risk to user privacy and data confidentiality. Private messages, which may contain sensitive personal or organizational information, can be exposed to unauthorized users, undermining trust in the platform and potentially violating data protection regulations such as the GDPR. The breach of confidentiality could lead to reputational damage, legal liabilities, and loss of user base. Since Lemmy is used in various communities including political, social, and professional groups, exposure of private communications could have broader societal impacts. The ease of exploitation without requiring elevated privileges or user interaction increases the likelihood of abuse. Organizations relying on Lemmy for internal or external communications must consider the risk of data leakage and potential compliance violations. Additionally, administrators could misuse the vulnerability to access private messages, raising insider threat concerns.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Lemmy instances to version 0.19.1 or later, where the vulnerability is patched. Until an upgrade is feasible, administrators should block the /api/v3/private_message/report endpoint at the reverse proxy or firewall level to prevent exploitation. This will disable the ability to report private messages but will protect against unauthorized data disclosure. It is also recommended to audit user registrations and restrict open registrations if possible, to reduce the risk of attacker account creation. Monitoring logs for unusual activity related to private message reporting or enumeration attempts can help detect exploitation attempts. Organizations should review their instance configurations to enforce strict access controls and consider implementing additional application-layer authorization checks. Finally, informing users about the issue and encouraging cautious sharing of sensitive information until the patch is applied can reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-01-19T00:18:53.234Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b72e

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:56:18 PM

Last updated: 7/31/2025, 7:28:47 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats