Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-26257 – Matrix is an ecosystem for open federated Instant Messaging and VoIP. Syn

Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference “homeserver” implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26257

Reference (s):

  • https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm
  • URL: https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm
  • FEDORA:FEDORA-2020-a2172c484d
  • URL: https://lists.fedoraproject.org/archives/list/[email protected]/message/QR4MMYZKX5N5GYGH4H5LBUUC5TLAFHI7/
  • FEDORA:FEDORA-2020-eeb66c2ece
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-8508 - Cross-site scripting (XSS) vulnerability in s_network.asp in the Denon AV

2021-current

CVE-2020-0297 - In devicepolicy service, there is a possible permission bypass due to an

2021-current

CVE-2020-14315 - A memory corruption vulnerability is present in bspatch as shipped in Col