Authentication Bypass Affecting org.matrix.android:matrix-android-sdk2 package, versions [,1.5.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGMATRIXANDROID-3035797
  • published29 Sept 2022
  • disclosed29 Sept 2022
  • creditUnknown

Introduced: 29 Sep 2022

CVE-2022-39248  (opens in a new tab)
CWE-322  (opens in a new tab)

How to fix?

Upgrade org.matrix.android:matrix-android-sdk2 to version 1.5.1 or higher.

Overview

org.matrix.android:matrix-android-sdk2 is a Matrix SDK for Android, extracted from the Element Android application.

Affected versions of this package are vulnerable to Authentication Bypass due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. matrix-android-sdk2 would then additionally sign such a key backup with its device key, spilling trust over to other devices trusting the matrix-android-sdk2 device.

CVSS Scores

version 3.1