CVE-2023-42453 – matrix-synapse
Package
Manager: pip
Name: matrix-synapse
Vulnerable Version: >=0.34.0 <1.93.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00127 pctl0.32902
Details
matrix-synapse vulnerable to improper validation of receipts allows forged read receipts ### Impact Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. ### Patches https://github.com/matrix-org/synapse/pull/16327 ### Workarounds There is no workaround.
Metadata
Created: 2023-09-26T19:20:38Z
Modified: 2024-09-24T17:49:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-7565-cq32-vx2x/GHSA-7565-cq32-vx2x.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-7565-cq32-vx2x
Finding: F039
Auto approve: 1