A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-06-11T17:13:37Z",
"url": "https://infosec.exchange/@screaminggoat/112599106666438577",
"attributedTo": "https://infosec.exchange/users/screaminggoat",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/screaminggoat/followers",
"https://infosec.exchange/users/regnil",
"https://infosec.exchange/users/cR0w",
"https://infosec.exchange/users/bschwifty",
"https://infosec.exchange/users/arinc629",
"https://infosec.exchange/users/Cali",
"https://infosec.exchange/users/wvu",
"https://mastodon.social/users/hrbrmstr",
"https://infosec.exchange/users/avoidthehack",
"https://infosec.exchange/users/bieberium"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2024-06-11:objectId=166832790:objectType=Conversation",
"content": "<p>Happy Patch Tuesday from <strong>Microsoft</strong>: 51 vulnerabilities, one is publicly disclosed:<br>MITRE: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50868\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-50868</a> (7.5 high) NSEC3 closest encloser proof can exhaust CPU. CVE-2023-50868 is regarding a vulnerability in DNSSEC validation where an attacker could exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users. MITRE created this CVE on their behalf.</p><p>If you consider a publicly disclosed vulnerability a zero-day, that's the takeaway for Microsoft releases. No mention of exploitation for everything else. Checked against the actual MSRC Security Update Guide: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">msrc.microsoft.com/update-guid</span><span class=\"invisible\">e/vulnerability</span></a></p><p>cc: <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@regnil\" class=\"u-url mention\">@<span>regnil</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bschwifty\" class=\"u-url mention\">@<span>bschwifty</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@arinc629\" class=\"u-url mention\">@<span>arinc629</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Cali\" class=\"u-url mention\">@<span>Cali</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@wvu\" class=\"u-url mention\">@<span>wvu</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@hrbrmstr\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>hrbrmstr</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@avoidthehack\" class=\"u-url mention\">@<span>avoidthehack</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bieberium\" class=\"u-url mention\">@<span>bieberium</span></a></span> (make sure to remove all the mentions to avoid ReplyAll madness)</p><p><a href=\"https://infosec.exchange/tags/PatchTuesday\" class=\"mention hashtag\" rel=\"tag\">#<span>PatchTuesday</span></a> <a href=\"https://infosec.exchange/tags/Microsoft\" class=\"mention hashtag\" rel=\"tag\">#<span>Microsoft</span></a> <a href=\"https://infosec.exchange/tags/MSRC\" class=\"mention hashtag\" rel=\"tag\">#<span>MSRC</span></a> <a href=\"https://infosec.exchange/tags/vulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerability</span></a> <a href=\"https://infosec.exchange/tags/CVE\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE</span></a> <a href=\"https://infosec.exchange/tags/CVE_2023_50868\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE_2023_50868</span></a></p>",
"contentMap": {
"en": "<p>Happy Patch Tuesday from <strong>Microsoft</strong>: 51 vulnerabilities, one is publicly disclosed:<br>MITRE: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50868\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-50868</a> (7.5 high) NSEC3 closest encloser proof can exhaust CPU. CVE-2023-50868 is regarding a vulnerability in DNSSEC validation where an attacker could exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users. MITRE created this CVE on their behalf.</p><p>If you consider a publicly disclosed vulnerability a zero-day, that's the takeaway for Microsoft releases. No mention of exploitation for everything else. Checked against the actual MSRC Security Update Guide: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">msrc.microsoft.com/update-guid</span><span class=\"invisible\">e/vulnerability</span></a></p><p>cc: <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@regnil\" class=\"u-url mention\">@<span>regnil</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bschwifty\" class=\"u-url mention\">@<span>bschwifty</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@arinc629\" class=\"u-url mention\">@<span>arinc629</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Cali\" class=\"u-url mention\">@<span>Cali</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@wvu\" class=\"u-url mention\">@<span>wvu</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@hrbrmstr\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>hrbrmstr</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@avoidthehack\" class=\"u-url mention\">@<span>avoidthehack</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bieberium\" class=\"u-url mention\">@<span>bieberium</span></a></span> (make sure to remove all the mentions to avoid ReplyAll madness)</p><p><a href=\"https://infosec.exchange/tags/PatchTuesday\" class=\"mention hashtag\" rel=\"tag\">#<span>PatchTuesday</span></a> <a href=\"https://infosec.exchange/tags/Microsoft\" class=\"mention hashtag\" rel=\"tag\">#<span>Microsoft</span></a> <a href=\"https://infosec.exchange/tags/MSRC\" class=\"mention hashtag\" rel=\"tag\">#<span>MSRC</span></a> <a href=\"https://infosec.exchange/tags/vulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerability</span></a> <a href=\"https://infosec.exchange/tags/CVE\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE</span></a> <a href=\"https://infosec.exchange/tags/CVE_2023_50868\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE_2023_50868</span></a></p>"
},
"updated": "2024-06-11T17:15:04Z",
"attachment": [],
"tag": [
{
"type": "Mention",
"href": "https://infosec.exchange/users/regnil",
"name": "@regnil"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/cR0w",
"name": "@cR0w"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/bschwifty",
"name": "@bschwifty"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/arinc629",
"name": "@arinc629"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/Cali",
"name": "@Cali"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/wvu",
"name": "@wvu"
},
{
"type": "Mention",
"href": "https://mastodon.social/users/hrbrmstr",
"name": "@hrbrmstr@mastodon.social"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/avoidthehack",
"name": "@avoidthehack"
},
{
"type": "Mention",
"href": "https://infosec.exchange/users/bieberium",
"name": "@bieberium"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/patchtuesday",
"name": "#patchtuesday"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/microsoft",
"name": "#microsoft"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/msrc",
"name": "#msrc"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/vulnerability",
"name": "#vulnerability"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cve",
"name": "#cve"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cve_2023_50868",
"name": "#cve_2023_50868"
}
],
"replies": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies?min_id=112599138016204687&page=true",
"partOf": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies",
"items": [
"https://infosec.exchange/users/screaminggoat/statuses/112599138016204687"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/likes",
"type": "Collection",
"totalItems": 8
},
"shares": {
"id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/shares",
"type": "Collection",
"totalItems": 3
}
}