4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
49.0%
A malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service.
Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected.
Server administrators are advised to upgrade to Synapse 1.94.0 or later.
Rooms with malicious server ACL events can be purged and blocked using the admin API.
CPE | Name | Operator | Version |
---|---|---|---|
matrix-synapse | lt | 1.94.0 |
github.com/advisories/GHSA-5chr-wjw5-3gq4
github.com/matrix-org/synapse/commit/f84da3c32ec74cf054e2fd6d10618aa4997cffaa
github.com/matrix-org/synapse/pull/16360
github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4
github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2023-199.yaml
lists.fedoraproject.org/archives/list/[email protected]/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/
lists.fedoraproject.org/archives/list/[email protected]/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
lists.fedoraproject.org/archives/list/[email protected]/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/
matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version
nvd.nist.gov/vuln/detail/CVE-2023-45129
security.gentoo.org/glsa/202401-12