CVE-2022-39374
Summary
| CVE | CVE-2022-39374 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-26 14:15:00 UTC |
| Updated | 2023-09-18 04:15:00 UTC |
| Description | Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0 |
Risk And Classification
Problem Types: CWE-400
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Denial of service due to incorrect application of event authorization rules during state resolution · Advisory · matrix-org/synapse · GitHub | MISC | github.com | |
| [SECURITY] Fedora 37 Update: python-matrix-common-1.3.0-7.fc37 - package-announce - Fedora Mailing-Lists | MISC | lists.fedoraproject.org | |
| Avoid putting rejected events in room state by squahtx · Pull Request #13723 · matrix-org/synapse · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.