Lucene search

K
githubGitHub Advisory DatabaseGHSA-7565-CQ32-VX2X
HistorySep 26, 2023 - 7:20 p.m.

matrix-synapse vulnerable to improper validation of receipts allows forged read receipts

2023-09-2619:20:38
CWE-285
GitHub Advisory Database
github.com
14
vulnerability
matrix-synapse
forged receipts
read receipts
room id
event id
patch

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

25.1%

Impact

Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room.

Patches

https://github.com/matrix-org/synapse/pull/16327

Workarounds

There is no workaround.

Affected configurations

Vulners
Node
matrixsynapseRange0.34.0
OR
matrixsynapseRange<1.93.0

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

25.1%