matrix-synapse@1.139.0 vulnerabilities

Homeserver for the Matrix decentralised comms protocol

  • latest version

    1.139.2

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    5 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the matrix-synapse package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Validation of Specified Type of Input

    matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP.

    Affected versions of this package are vulnerable to Improper Validation of Specified Type of Input due to insufficient validation of device keys. An attacker can disrupt federation functionality and unpredictably break outbound federation to other homeservers by registering on the victim homeserver and submitting invalid device keys. This is only exploitable if the attacker is a registered user on the victim homeserver.

    Note

    Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, we recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2.

    How to fix Improper Validation of Specified Type of Input?

    Upgrade matrix-synapse to version 1.138.3, 1.139.1 or higher.

    [,1.138.3)[1.139.0rc2,1.139.1)