9.3 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
0.001 Low
EPSS
Percentile
26.6%
Sydent is an identity server for the Matrix communications protocol. Prior
to version 2.5.6, if configured to send emails using TLS, Sydent does not
verify SMTP servers’ certificates. This makes Sydent’s emails vulnerable to
interception via a man-in-the-middle (MITM) attack. Attackers with
privileged access to the network can intercept room invitations and address
confirmation emails. This is patched in Sydent 2.5.6. When patching, make
sure that Sydent trusts the certificate of the server it is connecting to.
This should happen automatically when using properly issued certificates.
Those who use self-signed certificates should make sure to copy their
Certification Authority certificate, or their self signed certificate if
using only one, to the trust store of your operating system. As a
workaround, one can ensure Sydent’s emails fail to send by setting the
configured SMTP server to a loopback or non-routable address under one’s
control which does not have a listening SMTP server.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | matrix-sydent | < any | UNKNOWN |
ubuntu | 23.10 | noarch | matrix-sydent | < any | UNKNOWN |
ubuntu | 24.04 | noarch | matrix-sydent | < any | UNKNOWN |
docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations
github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261
github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261 (v2.5.6)
github.com/matrix-org/sydent/pull/574
github.com/matrix-org/sydent/releases/tag/v2.5.6
github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g
github.com/python/cpython/issues/91826
launchpad.net/bugs/cve/CVE-2023-38686
nvd.nist.gov/vuln/detail/CVE-2023-38686
peps.python.org/pep-0476/
security-tracker.debian.org/tracker/CVE-2023-38686
www.cve.org/CVERecord?id=CVE-2023-38686