logo

CVE-2023-38690 matrix-appservice-irc

Package

Manager: npm
Name: matrix-appservice-irc
Vulnerable Version: >=0 <1.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N

EPSS: 0.00133 pctl0.33712

Details

matrix-appservice-irc IRC command injection via admin commands containing newlines ### Impact It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. ### Patches Versions 1.0.1 and above are patched. ### Workarounds There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).

Metadata

Created: 2023-08-04T17:26:45Z
Modified: 2024-06-20T14:53:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-3pmj-jqqp-2mj3/GHSA-3pmj-jqqp-2mj3.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-3pmj-jqqp-2mj3
Finding: F184
Auto approve: 1