Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qg4-cvh2-crgg

Опубликовано: 18 июл. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.3
CVSS3: 4.8

Описание

matrix-sdk-crypto's UserIdentity::is_verified not checking verification status of own user identity while performing the check

The UserIdentity::is_verified() method in the matrix-sdk-crypto crate before version 0.7.2 doesn't take into account the verification status of the user's own identity while performing the check and may as a result return a value contrary to what is implied by its name and documentation.

Impact

If the method is used to decide whether to perform sensitive operations towards a user identity, a malicious homeserver could manipulate the outcome in order to make the identity appear trusted. This is not a typical usage of the method, which lowers the impact. The method itself is not used inside the matrix-sdk-crypto crate.

Patches

The 0.7.2 release of the matrix-sdk-crypto crate includes a fix.

Workarounds

None.

Пакеты

Наименование

matrix-sdk-crypto

rust
Затронутые версииВерсия исправления

< 0.7.2

0.7.2

EPSS

Процентиль: 20%
0.00066
Низкий

6.3 Medium

CVSS4

4.8 Medium

CVSS3

Дефекты

CWE-287
CWE-863

Связанные уязвимости

CVSS3: 5.4
nvd
больше 1 года назад

matrix-rust-sdk is an implementation of a Matrix client-server library in Rust. The `UserIdentity::is_verified()` method in the matrix-sdk-crypto crate before version 0.7.2 doesn't take into account the verification status of the user's own identity while performing the check and may as a result return a value contrary to what is implied by its name and documentation. If the method is used to decide whether to perform sensitive operations towards a user identity, a malicious homeserver could manipulate the outcome in order to make the identity appear trusted. This is not a typical usage of the method, which lowers the impact. The method itself is not used inside the `matrix-sdk-crypto` crate. The 0.7.2 release of the `matrix-sdk-crypto` crate includes a fix. All users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 20%
0.00066
Низкий

6.3 Medium

CVSS4

4.8 Medium

CVSS3

Дефекты

CWE-287
CWE-863