Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:40930
HistoryJun 16, 2023 - 11:15 a.m.

Authorization Bypass

2023-06-1611:15:44
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
6
matrix-synapse
authorization bypass
user deactivation
json web tokens
login
password database
admin api

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.0%

matrix-synapse is vulnerable to Authorization Bypass. The vulnerability exists because it does not properly validate the deactivated status of users during login time. which allows a user to login even if there account is deactivated. Note that this vulnerability only applies if JSON Web Tokens are enabled for login via the jwt_config.enabled configuration setting, the local password database is enabled via the password_config.enabled and password_config.localdb_enabled configuration settings and a user’s password is updated via an admin API after a user is deactivated.

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

48.0%