Information Exposure Affecting matrix-appservice-irc package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-MATRIXAPPSERVICEIRC-6597978
- published 12 Apr 2024
- disclosed 11 Apr 2024
- credit Val Lorentz
Introduced: 11 Apr 2024
CVE-2024-32000 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
matrix-appservice-irc is an An IRC Bridge for Matrix
Affected versions of this package are vulnerable to Information Exposure due to improper verification of user permissions before constructing a reply to an event. An attacker can leak the truncated body of a message by sending a Matrix reply to an event ID they do not have access to.
Note: This works if the attacker knows the event ID and is joined to both the Matrix room and the IRC channel it is bridged to.
Workaround
This vulnerability can be mitigated by setting a reply template that doesn't contain the original message.