@fedify/fedify is vulnerable to Improper Authentication
87
High Risk
Affected versions of this package are vulnerable to authentication bypass in the inbox handler, allowing unauthenticated attackers to impersonate any ActivityPub actor. The vulnerability arises because activity messages are processed before verifying that the HTTP Signature key belongs to the claimed actor. This flaw enables actor impersonation. The patched version mitigates the issue by performing authentication checks before processing activities.
You are affected if you are using a version that falls within the vulnerable range.
@fedify/fedify is vulnerable to Improper Authentication in versions 1.8.0 - 1.8.4, 1.7.0 - 1.7.8, 1.6.0 - 1.6.7, 1.5.0 - 1.5.4, 1.4.0 - 1.4.12 and 0.0.1 - 1.3.19.
Upgrade the @fedify/fedify library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant