logo

CVE-2023-30609 matrix-react-sdk

Package

Manager: npm
Name: matrix-react-sdk
Vulnerable Version: >=0 <3.71.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L

EPSS: 0.00385 pctl0.58939

Details

HTML injection in search results via plaintext message highlighting ### Impact Plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. Cross-site scripting is possible by including resources from `recaptcha.net` and `gstatic.com` which are included in the default CSP. Thanks to [Cadence Ember](https://cadence.moe/) for finding the injection and to [S1m](https://github.com/p1gp1g/) for finding possible XSS vectors. ### Patches Version 3.71.0 of the SDK fixes the issue. ### Workarounds Restarting the client will clear the injection.

Metadata

Created: 2023-04-25T19:48:11Z
Modified: 2023-09-22T19:51:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-xv83-x443-7rmw/GHSA-xv83-x443-7rmw.json
CWE IDs: ["CWE-74", "CWE-79"]
Alternative ID: GHSA-xv83-x443-7rmw
Finding: F008
Auto approve: 1