Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4jf8-g8wp-cx7c

Опубликовано: 15 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.7

Описание

Matrix JavaScript SDK's key history sharing could share keys to malicious devices

Impact

In matrix-js-sdk versions 9.11.0 through 34.7.0, the method MatrixClient.sendSharedHistoryKeys is vulnerable to interception by malicious homeservers. The method implements functionality proposed in MSC3061 and can be used by clients to share historical message keys with newly invited users, granting them access to past messages in the room.

However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks.

Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call MatrixClient.initRustCrypto() instead of MatrixClient.initCrypto()) are unaffected by this vulnerability, because MatrixClient.sendSharedHistoryKeys() raises an exception in such environments.

Patches

Fixed in matrix-js-sdk 34.8.0 by removing the vulnerable functionality.

Workarounds

Remove use of affected functionality from clients.

References

For more information

If you have any questions or comments about this advisory, please email us at security at matrix.org.

Пакеты

Наименование

matrix-js-sdk

npm
Затронутые версииВерсия исправления

>= 9.11.0, < 34.8.0

34.8.0

EPSS

Процентиль: 62%
0.00427
Низкий

8.7 High

CVSS4

Дефекты

CWE-200
CWE-287

Связанные уязвимости

ubuntu
больше 1 года назад

matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected ...

nvd
больше 1 года назад

matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected by

debian
больше 1 года назад

matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeS ...

CVSS3: 5.3
fstec
больше 1 года назад

Уязвимость функции MatrixClient.sendSharedHistoryKeys набора средств разработки для JavaScript и TypeScript matrix-js-sdk, позволяющая нарушителю обойти процедуру аутентификации и получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 62%
0.00427
Низкий

8.7 High

CVSS4

Дефекты

CWE-200
CWE-287