Pixelfed 泄露了来自其他联邦宇宙实例的私密帖子
Pixelfed leaks private posts from other Fediverse instances

原始链接: https://fokus.cool/2025/03/25/pixelfed-vulnerability.html

2025年3月14日,广受欢迎的Fediverse平台Pixelfed被发现存在安全漏洞。由于实现错误,Pixelfed实例忽略了其他服务器上的隐私设置,允许任何Pixelfed实例的用户查看其他Fediverse平台上用户的私密帖子,即使未被对方接受为关注者。 该漏洞源于Pixelfed未能正确导入远程账户的“manuallyApprovesFollowers”属性,导致系统错误地认为所有账户都是公开的。这使得在Pixelfed用户关注一个已锁定的账户后,可以访问其未经授权的私密内容。 漏洞发现者于3月16日负责任地将此问题告知了Pixelfed维护者Dansup。然而,Dansup在未协调披露时间线的情况下公开发布了修复程序,这可能危及用户安全。随后的v1.12.5版本是一个重大更新,需要大量的系统升级,这可能会延迟必要的补丁修复。此事件凸显了Pixelfed处理安全问题的方式以及此类问题对Fediverse信任度影响的担忧。作者建议增加功能以更好地限制共享的数据,并为管理员提供工具来阻止与存在漏洞的实例进行联邦。

Hacker News 最新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 Pixelfed 泄露来自其他 Fediverse 实例的私密帖子 (fokus.cool) 7 分,来自 pierremenard,42 分钟前 | 隐藏 | 过去 | 收藏 | 1 评论 erlend_sh 4 分钟前 [–] 这篇帖子有一个有趣的后续内容,为此次事件和问题领域提供了更多背景信息:https://lemmy.world/post/27522773 回复 加入我们,参加 6 月 16-17 日在旧金山举办的 AI 初创公司学校! 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系我们 搜索:

原文

When following someone on a different server on the Fediverse, the remote server decides whether you are allowed to do so. This enables features like private accounts. Due to an implementation mistake, Pixelfed ignores this and allows anyone to follow even private accounts on other servers. When a legitimate user from a Pixelfed instance follows you on your locked fediverse account, anyone on that Pixelfed instance can read your private posts. You don’t need to be a Pixelfed user to be affected.

Pixelfed admins should update to v1.12.5 ASAP, but upgrading can be a major hurdle.

Storytime

Two weeks ago, a partner and I were on vacation far away from home. We were enjoying some well deserved rest after a long day outside, when I looked over to see her shooting confused looks at her phone.

“Someone favorited a toot that they should not be able to see. How is this possible?” she said, holding it up in my face.

“What? No way.”

But sure enough, the toot was followers only and the person that had liked it was not following her Mastodon account. When I took a look at the other persons profile on pixelfed.social, I noticed that the instance was nevertheless claiming the account was following her. I already dreaded what I felt was about to happen.

I created an account on pixelfed.social and clicked follow on my partner’s Mastodon account, and… I could see all of her private posts. Instead of telling me I’d have to wait to have my follow accepted, I was already following her.

“Oh no, not again”, I said, dreading the thought of spending the next few hours reading PHP code and writing a report.

ActivityPub

In order to understand how this happened we have to know some bits about ActivityPub, the protocol that’s powering the Fediverse.

In most ActivityPub implementations the user can decide whether they want to manually review new followers. In Mastodon this is achieved by disabling “Automatically accept new followers”. Sometimes it’s called Locked Account. Now the server adds the property as:manuallyApprovesFollowers to the profile and all other servers know to display the small lock 🔒 symbol next to your username.

Screenshot of the Automatically accept new followers setting of Mastodon

When you click follow on someones profile, your server sends a message to the remote server, requesting a follow. Then the remote server either accepts the request, declines it, or ignores it until eternity, depending on the target users choice.

ActivityPub Follow Flow diagram

What’s important to add is, the two-way handshake happens independently of whether the other person has their account locked or not. It’s always up to the remote server to decide if that follow is going to happen. Spec-brained people would phrase it like that:

The side effect of receiving this [follow request] in an outbox is that the server SHOULD add the object to the actor’s following Collection when and only if an Accept activity is subsequently received with this Follow activity as its object.

(From ActivityPub - 6.5 Follow Activity)

The vulnerability

Pixelfeds ActivityPub implementation was (and still is) incomplete. They did export the as:manuallyApprovesFollowers property, but they didn’t import them for remote accounts. Hence remote accounts always displayed as Not Locked. While being annoying for users, this is not not a security issue in itself.

However, there was another issue. When pixelfed assumes that an account is not locked, it immediately treats a follow attempt as completed. For the server on the other end it looks like a normal follow request. It could be rejected, and pixelfed would still be convinced that a follow relation exists.

This is the responsible code:

 1if ($private == true) {
 2    $follow = FollowRequest::firstOrCreate([
 3        'follower_id' => $user->profile_id,
 4        'following_id' => $target->id,
 5    ]);
 6    if ($remote == true && config('federation.activitypub.remoteFollow') == true) {
 7        (new FollowerController)->sendFollow($user->profile, $target);
 8    }
 9} else {
10    $follower = Follower::firstOrCreate([
11        'profile_id' => $user->profile_id,
12        'following_id' => $target->id,
13    ]);
14
15    if ($remote == true && config('federation.activitypub.remoteFollow') == true) {
16        (new FollowerController)->sendFollow($user->profile, $target);
17    }
18    FollowPipeline::dispatch($follower)->onQueue('high');
19}

app/Http/Controllers/Api/ApiV1Controller.php Lines 859-877

Importantly, your Mastodon or GoToSocial instance isn’t handing your private posts to any random server, just because it asks. The problem only becomes apparent when you have at least one legit accepted follower from a Pixelfed server. Now that server is allowed to fetch all your private posts. And when it knows the posts, it has to decide who to show them. When you accept a follower, you not only place your trust to keep a secret on them, but also on their admin and the software they are running.

Why is this a serious issue?

There’s a reasonable chance you have a follower on one of the big Pixelfed instances, like pixelfed.social. An attacker who wants to see your private posts could create an account there, follow you, and immediately see your posts. You would receive a follow request, but it wouldn’t matter whether you’re accepting it or not.. You can’t possibly notice that your posts are exposed to strangers, and there’s nothing you could do about it.

The problem is exaggerated by the fact that pixelfeds users are concentrated on few very big instances.

Report

Noticing that seemingly noone had noticed this before, I knew that handling this knowlege responsible and carefully was very important. To follow best practises for a responsible disclosure process I pieced together a detailed analysis along with the request to agree on a disclosure timeline. This was shared privately using GitHub’s Advisory feature alongside an email to their contact address.

Among the things I wrote:

The attack vector becoming public would put many thousand users at danger. Therefore it must be handled with utmost care.

From what I can tell this is a serious issue with severe real-world implications. Please don’t publish the advisory or fixes without further coordination.

Reaction

After about 30 hours I got a first reply from Dansup, the solo pixelfed maintainer.

Hi Thank you for the report, I am working on the fix.

Another two days later he pushed the fixes into the public repository.

Screenshot of dansups commits

By doing that he published the vulnerability. With commit messages like “Update ActivityPub helpers, improve private account handling” it is a dead giveaway when one knows what they’re looking for.

So I reached out to Dan:

[…] Unfortunately, now that the commits are pushed in a public repository the tooth paste is out of the tube. It’s not possible to announce a grace period for the instance operators to prepare for a coordinated update. Therefore the way to go would be to publish a release and announce that admins should update their servers asap.

The last release v0.12.4 is almost half a year old, so a release would contain a lot of changes, which could further delay admins updating their servers.. Is it possible to go out with a v0.12.5 first (or in parallel) that contains only the back-ported security patches?

His only reaction was:

Yes, I am preparing the release as we speak!

A few days later the release dropped. While the version increment (v0.12.4 to v0.12.5) implies a minor update, it’s a huge leap. We’re totalling more than 450 commits, including the requirement of a new version of PHP, which on some distros requires a major system upgrade. In the release notes it’s not obvious in any way that there is a critical vulnerability fixed in this release, while they mention an important privacy fix in a Mastodon post.

Disclosure

Ideally, serious security issues in open source software are handled like this:

  1. Problem is reported to maintainers
  2. Fix is developed in private
  3. Public announcement of a security release on a specified day
  4. Admins and package maintainers prepare for the update
  5. Fix is published
  6. Admins patch their servers immediately

Other projects, like Mastodon, have done it like this in the past.

That’s what I intended and asked for. Instead my requests were ignored and communication was poor.

Conclusion

I’m disappointed by how Pixelfed managed the vulnerability. From a project with (supposedly) more than 150k monthly active users and generous funding I expect better.

This is not the first incident of Pixelfed handling security matters poorly. A similar situation unfolded a few months ago, when a bug left hundreds of instances vulnerable which apparently resulted in stolen S3 API keys. At time of writing, there is also a three years old GitHub issue that reports 2FA being broken. 🤯

The maintainer has a track record of hostile behaviour towards the community. His new project Loops is making headlines as “the fediverse answer to TikTok”, despite (still?) being closed source, not federating and having questionable terms of services.

Crucially, the fediverse is based on trust. I think there is a discussion to be had about the impact that reckless behaviour has on the general environment of the fediverse. Pixelfed is one of the most popular ActivityPub implementations, and that comes with a certain responsibility. Furthermore we have to work on better approaches to handle trust. For example by providing more features to limit what is shared with whom, and transparency ingrained into the user interface. We need tooling that allows instance admins to stop federation with known vulnerable software versions. Both to mitigate risk and force instance admins to upgrade.

Timeline

Times are in UTC

  • 2025-03-14: Vulnerability is discovered and analysed
  • 2025-03-16 15:00: I create the GitHub Report and send an email to [email protected]
  • 2025-03-17 21:30: First reaction by Dansup
  • 2025-03-19 08:30: Dansup publicly pushes fixes
  • 2025-03-21 07:50: I ask Dansup for a backport security release
  • 2025-03-24 06:00: Dansup releases pixelfed v1.12.5
  • 2025-03-25 17:00: Release of this post

· security , fediverse
联系我们 contact @ memedata.com