CVE-2023-38690 – matrix-appservice-irc
Package
Manager: npm
Name: matrix-appservice-irc
Vulnerable Version: >=0 <1.0.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
EPSS: 0.00133 pctl0.33712
Details
matrix-appservice-irc IRC command injection via admin commands containing newlines ### Impact It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. ### Patches Versions 1.0.1 and above are patched. ### Workarounds There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
Metadata
Created: 2023-08-04T17:26:45Z
Modified: 2024-06-20T14:53:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-3pmj-jqqp-2mj3/GHSA-3pmj-jqqp-2mj3.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-3pmj-jqqp-2mj3
Finding: F184
Auto approve: 1