All the vulnerabilites related to element-hq - synapse
cve-2024-37302
Vulnerability from cvelistv5
Published
2024-12-03 17:04
Modified
2024-12-03 18:56
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amounts of remote media. The default rate limit strategy is insufficient to mitigate this. This can lead to a denial of service, ranging from further media uploads/downloads failing to completely unavailability of the Synapse process, depending on how Synapse was deployed. Synapse 1.106 introduces a new "leaky bucket" rate limit on remote media downloads to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user's ability to request large amounts of data to be cached.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.106 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.106", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37302", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T18:55:21.581964Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T18:56:17.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.106" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amounts of remote media. The default rate limit strategy is insufficient to mitigate this. This can lead to a denial of service, ranging from further media uploads/downloads failing to completely unavailability of the Synapse process, depending on how Synapse was deployed. Synapse 1.106 introduces a new \"leaky bucket\" rate limit on remote media downloads to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user\u0027s ability to request large amounts of data to be cached." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T17:04:15.839Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x" } ], "source": { "advisory": "GHSA-4mhg-xv73-xq2x", "discovery": "UNKNOWN" }, "title": "Synapse denial of service through media disk space consumption" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37302", "datePublished": "2024-12-03T17:04:15.839Z", "dateReserved": "2024-06-05T20:10:46.497Z", "dateUpdated": "2024-12-03T18:56:17.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-53863
Vulnerability from cvelistv5
Published
2024-12-03 16:48
Modified
2024-12-03 19:08
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon image formats, potentially invoking external tools like Ghostscript for processing. This significantly expands the attack surface in a historically vulnerable area, presenting a risk that far outweighs the benefit, particularly since these formats are rarely used on the open web or within the Matrix ecosystem. Synapse 1.120.1 addresses the issue by restricting thumbnail generation to images in the following widely used formats: PNG, JPEG, GIF, and WebP. This vulnerability is fixed in 1.120.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.120.1 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.120.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-53863", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T19:07:32.536899Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T19:08:30.218Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.120.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon image formats, potentially invoking external tools like Ghostscript for processing. This significantly expands the attack surface in a historically vulnerable area, presenting a risk that far outweighs the benefit, particularly since these formats are rarely used on the open web or within the Matrix ecosystem. Synapse 1.120.1 addresses the issue by restricting thumbnail generation to images in the following widely used formats: PNG, JPEG, GIF, and WebP. This vulnerability is fixed in 1.120.1." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 8.2, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434: Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T16:48:29.722Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g" } ], "source": { "advisory": "GHSA-vp6v-whfm-rv3g", "discovery": "UNKNOWN" }, "title": "Synapse can be forced to thumbnail unexpected file formats, invoking external, potentially untrustworthy decoders" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53863", "datePublished": "2024-12-03T16:48:29.722Z", "dateReserved": "2024-11-22T17:30:02.145Z", "dateUpdated": "2024-12-03T19:08:30.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-31208
Vulnerability from cvelistv5
Published
2024-04-23 17:26
Modified
2024-08-02 01:46
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in the V2 state resolution algorithm. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. Server administrators should upgrade to 1.105.1 or later. Some workarounds are available. One can ban the malicious users or ACL block servers from the rooms and/or leave the room and purge the room using the admin API.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.105.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-31208", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T19:13:09.531555Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T18:42:58.878Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:46:04.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v" }, { "name": "https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a" }, { "name": "https://github.com/element-hq/synapse/releases/tag/v1.105.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/element-hq/synapse/releases/tag/v1.105.1" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RR53FNHV446CB37TP45GZ6F6HZLZCK3K/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6FCCO4ODTZ3FDS7TMW76PKOSEL2TQVB/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSF4NJJSTSQRJQ47PLYYSCFYKJBP7DET/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.105.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in the V2 state resolution algorithm. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. Server administrators should upgrade to 1.105.1 or later. Some workarounds are available. One can ban the malicious users or ACL block servers from the rooms and/or leave the room and purge the room using the admin API." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T17:26:39.171Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-3h7q-rfh9-xm4v" }, { "name": "https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/element-hq/synapse/commit/55b0aa847a61774b6a3acdc4b177a20dc019f01a" }, { "name": "https://github.com/element-hq/synapse/releases/tag/v1.105.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/element-hq/synapse/releases/tag/v1.105.1" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RR53FNHV446CB37TP45GZ6F6HZLZCK3K/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6FCCO4ODTZ3FDS7TMW76PKOSEL2TQVB/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSF4NJJSTSQRJQ47PLYYSCFYKJBP7DET/" } ], "source": { "advisory": "GHSA-3h7q-rfh9-xm4v", "discovery": "UNKNOWN" }, "title": "Synapse\u0027s V2 state resolution weakness allows DoS from remote room members" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31208", "datePublished": "2024-04-23T17:26:39.171Z", "dateReserved": "2024-03-29T14:16:31.900Z", "dateUpdated": "2024-08-02T01:46:04.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37303
Vulnerability from cvelistv5
Published
2024-12-03 17:06
Modified
2024-12-03 18:51
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr | x_refsource_CONFIRM | |
https://github.com/matrix-org/matrix-spec-proposals/pull/3916 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.106 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.106", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37303", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T18:49:29.668536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T18:51:29.590Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.106" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T17:06:02.467Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr" }, { "name": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916" } ], "source": { "advisory": "GHSA-gjgr-7834-rhxr", "discovery": "UNKNOWN" }, "title": "Synapse unauthenticated writes to the media repository allow planting of problematic content" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37303", "datePublished": "2024-12-03T17:06:02.467Z", "dateReserved": "2024-06-05T20:10:46.497Z", "dateUpdated": "2024-12-03T18:51:29.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-53867
Vulnerability from cvelistv5
Published
2024-12-03 16:52
Modified
2024-12-03 19:07
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages, are unaffected. This vulnerability is fixed in 1.120.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h | x_refsource_CONFIRM | |
https://github.com/matrix-org/matrix-spec-proposals/pull/4186 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: >= 1.113.0rc1, < 1.120.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-53867", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T19:07:06.315341Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T19:07:19.919Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003e= 1.113.0rc1, \u003c 1.120.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages, are unaffected. This vulnerability is fixed in 1.120.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-497", "description": "CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T16:52:01.596Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h" }, { "name": "https://github.com/matrix-org/matrix-spec-proposals/pull/4186", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/4186" } ], "source": { "advisory": "GHSA-56w4-5538-8v8h", "discovery": "UNKNOWN" }, "title": "Synapse Matrix has a partial room state leak via Sliding Sync" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53867", "datePublished": "2024-12-03T16:52:01.596Z", "dateReserved": "2024-11-22T17:30:02.145Z", "dateUpdated": "2024-12-03T19:07:19.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52815
Vulnerability from cvelistv5
Published
2024-12-03 16:58
Modified
2024-12-03 19:06
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts the invited user's /sync functionality. Synapse 1.120.1 rejects such invalid invites received over federation and restores the ability to sync for affected users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.120.1 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.120.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-52815", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T19:05:32.860627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T19:06:11.082Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.120.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts the invited user\u0027s /sync functionality. Synapse 1.120.1 rejects such invalid invites received over federation and restores the ability to sync for affected users." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T16:59:21.634Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h" } ], "source": { "advisory": "GHSA-f3r3-h2mq-hx2h", "discovery": "UNKNOWN" }, "title": "Synapse allows a a malformed invite to break the invitee\u0027s `/sync`" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52815", "datePublished": "2024-12-03T16:58:30.877Z", "dateReserved": "2024-11-15T17:11:13.444Z", "dateUpdated": "2024-12-03T19:06:11.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52805
Vulnerability from cvelistv5
Published
2024-12-03 17:01
Modified
2024-12-03 19:04
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type.
References
▼ | URL | Tags |
---|---|---|
https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2 | x_refsource_CONFIRM | |
https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518 | x_refsource_MISC | |
https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.120.1 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.120.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-52805", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T19:04:05.237385Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T19:04:44.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.120.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 8.2, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T17:01:50.119Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2" }, { "name": "https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518" }, { "name": "https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609" } ], "source": { "advisory": "GHSA-rfq8-j7rh-8hf2", "discovery": "UNKNOWN" }, "title": "Synapse allows unsupported content types to lead to memory exhaustion" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52805", "datePublished": "2024-12-03T17:01:50.119Z", "dateReserved": "2024-11-15T17:11:13.442Z", "dateUpdated": "2024-12-03T19:04:44.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }