Access Restriction Bypass Affecting matrix-synapse package, versions [,1.69.0rc1)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-MATRIXSYNAPSE-5600769
- published 25 May 2023
- disclosed 24 May 2023
- credit Unknown
Introduced: 24 May 2023
CVE-2022-39335 Open this link in a new tabHow to fix?
Upgrade matrix-synapse
to version 1.69.0rc1 or higher.
Overview
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP.
Affected versions of this package are vulnerable to Access Restriction Bypass due to Synapse homeservers answering a query for authorisation events not sufficiently checking that the requesting server should be able to access them. Authorisation events include power level events (the list of user IDs and their power levels at the time) and relevant membership events (including the display name of the sender of that event), as well as events like m.room.create
, m.room.third_party_invite
and m.room.join_rules
. Non-authorisation events are unaffected, so it isn't possible to extract message contents this way.
NOTE: This issue is only exploitable when an attacker knows the ID of a target room and the ID of an event from that room, which increases the complexity of a realistic attack. Additionally, this issue is of negligible consequence for public rooms given that any server can easily join the roomand view authorisation events. Deployments in a closed federation where all homeservers are trustworthy are not affected.