Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-32682
HistoryJun 06, 2023 - 12:00 a.m.

CVE-2023-32682

2023-06-0600:00:00
ubuntu.com
ubuntu.com
6
synapse
matrix protocol
homeserver
python
twisted framework
deactivated user
login
json web tokens
password database
admin api
single sign-on
cas
saml
openid connect
external password provider
ldap
cve-2023-32682

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.0%

Synapse is a Matrix protocol homeserver written in Python with the Twisted
framework. In affected versions it may be possible for a deactivated user
to login when using uncommon configurations. This only applies if any of
the following are true: 1. JSON Web Tokens are enabled for login via the
jwt_config.enabled configuration setting. 2. The local password database
is enabled via the password_config.enabled and
password_config.localdb_enabled configuration settings and a user’s
password is updated via an admin API after a user is deactivated. Note that
the local password database is enabled by default, but it is uncommon to
set a user’s password after they’ve been deactivated. Installations that
are configured to only allow login via Single Sign-On (SSO) via CAS, SAML
or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP)
are not affected. If not using JSON Web Tokens, ensure that deactivated
users do not have a password set. This issue has been addressed in version
1.85.0. Users are advised to upgrade.

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.0%