Information Exposure Affecting node-matrix-js-sdk package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-NODEMATRIXJSSDK-8500170
  • published13 Dec 2024
  • disclosed15 Oct 2024

Introduced: 15 Oct 2024

CVE-2024-47080  (opens in a new tab)
CWE-200  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

There is no fixed version for Debian:11 node-matrix-js-sdk.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-matrix-js-sdk package and not the node-matrix-js-sdk package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method MatrixClient.sendSharedHistoryKeys is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call MatrixClient.initRustCrypto() instead of MatrixClient.initCrypto()) are unaffected by this vulnerability, because MatrixClient.sendSharedHistoryKeys() raises an exception in such environments. The vulnerability was fixed in matrix-js-sdk 34.8.0 by removing the vulnerable functionality. As a workaround, remove use of affected functionality from clients.