CVE-2021-39163 – matrix-synapse
Package
Manager: pip
Name: matrix-synapse
Vulnerable Version: >=0 <1.41.1
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00272 pctl0.50318
Details
Adding a private/unlisted room to a community exposes room metadata in an unauthorised manner. ### Impact Unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where: - the vulnerable homeserver is in the room; and - untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. ### Patches Server administrators should upgrade to 1.41.1 or higher. ### Workarounds Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the following endpoints: * `/_matrix/client/r0/groups/{group_id}/rooms` * `/_matrix/client/unstable/groups/{group_id}/rooms` ### References n/a ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
Metadata
Created: 2021-09-01T18:25:44Z
Modified: 2024-09-24T15:37:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-jj53-8fmw-f2w2/GHSA-jj53-8fmw-f2w2.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-jj53-8fmw-f2w2
Finding: F310
Auto approve: 1