matrix-synapse@1.81.0rc1 vulnerabilities
Homeserver for the Matrix decentralised comms protocol
-
latest version
1.119.0
-
latest non vulnerable version
-
first published
6 years ago
-
latest version published
15 hours ago
-
licenses detected
- [0.33.5,1.99.0rc1)
Direct Vulnerabilities
Known vulnerabilities in the matrix-synapse package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a weakness in how the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,1.105.1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Information Exposure. An attacker can query remote users' device information which can be used to enumerate the remote users known to a homeserver. How to fix Information Exposure? Upgrade |
[,1.95.1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,1.94.0rc1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Improper Input Validation due to the improper validation of receipts. An attacker can forge read receipts for any event by knowing the room ID and event ID. How to fix Improper Input Validation? Upgrade |
[0.34.0,1.93.0)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Information Exposure due to temporarily stored plaintext passwords in the server database. An attacker can potentially access these passwords if they have access to the database backups. How to fix Information Exposure? Upgrade |
[1.66.0,1.93.0)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Incorrect Authorization in that it does not check for deactivated status of users during login, under certain conditions. Specifically, JSON Web Tokens must be enabled via the NOTE: Installations configured to only allow login via Single Sign-On (SSO) via CAS, SAML or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP) are not affected. If not using JSON Web Tokens, the list of deactivated users with a password set can be queried from PostgreSQL:
How to fix Incorrect Authorization? Upgrade |
[,1.85.0rc1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) by bypassing the
How to fix Server-side Request Forgery (SSRF)? Upgrade |
[,1.85.0rc1)
|