cve-2024-37303
Vulnerability from cvelistv5
Published
2024-12-03 17:06
Modified
2024-12-03 18:51
Severity ?
EPSS score ?
Summary
Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | element-hq | synapse |
Version: < 1.106 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "synapse", "vendor": "element-hq", "versions": [ { "lessThan": "1.106", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-37303", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T18:49:29.668536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T18:51:29.590Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "synapse", "vendor": "element-hq", "versions": [ { "status": "affected", "version": "\u003c 1.106" } ] } ], "descriptions": [ { "lang": "en", "value": "Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T17:06:02.467Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr" }, { "name": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916" } ], "source": { "advisory": "GHSA-gjgr-7834-rhxr", "discovery": "UNKNOWN" }, "title": "Synapse unauthenticated writes to the media repository allow planting of problematic content" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37303", "datePublished": "2024-12-03T17:06:02.467Z", "dateReserved": "2024-06-05T20:10:46.497Z", "dateUpdated": "2024-12-03T18:51:29.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-37303\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-12-03T17:15:10.890\",\"lastModified\":\"2024-12-03T17:15:10.890\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.\"},{\"lang\":\"es\",\"value\":\"Synapse es un servidor dom\u00e9stico Matrix de c\u00f3digo abierto. La versi\u00f3n 1.106 de Synapse permite, por dise\u00f1o, que los participantes remotos no autenticados activen una descarga y un almacenamiento en cach\u00e9 de contenido multimedia remoto desde un servidor dom\u00e9stico remoto al repositorio de contenido multimedia local. Dicho contenido tambi\u00e9n se vuelve disponible para su descarga desde el servidor dom\u00e9stico local de forma no autenticada. La implicaci\u00f3n es que los adversarios remotos no autenticados pueden usar esta funcionalidad para introducir contenido problem\u00e1tico en el repositorio de contenido multimedia. La versi\u00f3n 1.106 de Synapse introduce una mitigaci\u00f3n parcial en forma de nuevos endpoints que requieren autenticaci\u00f3n para las descargas de contenido multimedia. Los endpoints no autenticados se congelar\u00e1n en una versi\u00f3n futura, lo que cerrar\u00e1 el vector de ataque.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"references\":[{\"url\":\"https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/matrix-org/matrix-spec-proposals/pull/3916\",\"source\":\"security-advisories@github.com\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.