SB2023060718 - Multiple vulnerabilities in Matrix Synapse
Published: June 7, 2023 Updated: June 8, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2023-32683)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the oEmbed and image URLs. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
2) Improper access control (CVE-ID: CVE-2023-32682)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper checks for deactivated users during login. A remote user can login when using uncommon configurations.
Remediation
Install update from vendor's website.
References
- https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc
- https://github.com/matrix-org/synapse/pull/15601
- https://github.com/matrix-org/synapse/releases/tag/v1.85.0
- https://github.com/matrix-org/synapse/security/advisories/GHSA-26c5-ppr8-f33p
- https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#password_config
- https://github.com/matrix-org/synapse/pull/15624
- https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account
- https://matrix-org.github.io/synapse/latest/jwt.html
- https://github.com/matrix-org/synapse/pull/15634