{"id":"CVE-2023-49952","details":"Mastodon 4.1.x before 4.1.17 and 4.2.x before 4.2.9 allows a bypass of rate limiting via a crafted HTTP request header.","aliases":["BIT-mastodon-2023-49952","GHSA-c2r5-cfqr-c553"],"modified":"2026-04-10T05:05:14.690824Z","published":"2024-11-18T18:15:05.927Z","references":[{"type":"WEB","url":"https://github.com/mastodon/mastodon/security"},{"type":"ADVISORY","url":"https://github.com/mastodon/mastodon/security/advisories/GHSA-c2r5-cfqr-c553"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tootsuite/mastodon","events":[{"introduced":"61c5dfb9295ea66c376c452a7ef7379e8c562416"},{"fixed":"1cad857f14f08370a023e46c24eb81f702bc7e86"},{"introduced":"4fcc026f0f1b12a9de21a3af33375a9c8867dd55"},{"fixed":"c93aacafdea188cac791b62a32e3117a7dc3e9cc"}],"database_specific":{"versions":[{"introduced":"4.1.0"},{"fixed":"4.1.17"},{"introduced":"4.2.0"},{"fixed":"4.2.9"}]}}],"versions":["v4.1.0","v4.1.1","v4.1.10","v4.1.11","v4.1.12","v4.1.13","v4.1.14","v4.1.15","v4.1.16","v4.1.2","v4.1.3","v4.1.4","v4.1.5","v4.1.6","v4.1.7","v4.1.8","v4.1.9","v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.2.7","v4.2.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49952.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}