Information Exposure Affecting matrix-appservice-irc package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-MATRIXAPPSERVICEIRC-6597978
  • published12 Apr 2024
  • disclosed11 Apr 2024
  • creditVal Lorentz

Introduced: 11 Apr 2024

CVE-2024-32000  (opens in a new tab)
CWE-280  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

matrix-appservice-irc is an An IRC Bridge for Matrix

Affected versions of this package are vulnerable to Information Exposure due to improper verification of user permissions before constructing a reply to an event. An attacker can leak the truncated body of a message by sending a Matrix reply to an event ID they do not have access to.

Note: This works if the attacker knows the event ID and is joined to both the Matrix room and the IRC channel it is bridged to.

Workaround

This vulnerability can be mitigated by setting a reply template that doesn't contain the original message.

CVSS Scores

version 3.1