Information Exposure Affecting matrix-appservice-irc package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-MATRIXAPPSERVICEIRC-6597978
  • published 12 Apr 2024
  • disclosed 11 Apr 2024
  • credit Val Lorentz

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

matrix-appservice-irc is an An IRC Bridge for Matrix

Affected versions of this package are vulnerable to Information Exposure due to improper verification of user permissions before constructing a reply to an event. An attacker can leak the truncated body of a message by sending a Matrix reply to an event ID they do not have access to.

Note: This works if the attacker knows the event ID and is joined to both the Matrix room and the IRC channel it is bridged to.

Workaround

This vulnerability can be mitigated by setting a reply template that doesn't contain the original message.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
4.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None