matrix-sydent@2.0.1 vulnerabilities

Reference Matrix Identity Verification and Lookup Server

Direct Vulnerabilities

Known vulnerabilities in the matrix-sydent package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Certificate Validation

matrix-sydent is a Reference Matrix Identity Verification and Lookup Server

Affected versions of this package are vulnerable to Improper Certificate Validation. If configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the network can intercept room invitations and address confirmation emails.

How to fix Improper Certificate Validation?

Upgrade matrix-sydent to version 2.5.6 or higher.

[,2.5.6)
  • M
Improper Input Validation

matrix-sydent is a Reference Matrix Identity Verification and Lookup Server

Affected versions of this package are vulnerable to Improper Input Validation. A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example.

How to fix Improper Input Validation?

Upgrade matrix-sydent to version 2.3.0 or higher.

[,2.3.0)
  • H
Denial of Service (DoS)

matrix-sydent is a Reference Matrix Identity Verification and Lookup Server

Affected versions of this package are vulnerable to Denial of Service (DoS). Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients.

How to fix Denial of Service (DoS)?

Upgrade matrix-sydent to version 2.3.0 or higher.

[,2.3.0)
  • M
Improper Input Validation

matrix-sydent is a Reference Matrix Identity Verification and Lookup Server

Affected versions of this package are vulnerable to Improper Input Validation. Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.

How to fix Improper Input Validation?

Upgrade matrix-sydent to version 2.3.0 or higher.

[,2.3.0)
  • H
Server-side Request Forgery (SSRF)

matrix-sydent is a Reference Matrix Identity Verification and Lookup Server

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. An additional potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.

How to fix Server-side Request Forgery (SSRF)?

Upgrade matrix-sydent to version 2.3.0 or higher.

[,2.3.0)