CVE-2023-3382 – SourceCodester Game Result Matrix System GET Parameter save-delegates.php cross site scripting
https://notcve.org/view.php?id=CVE-2023-3382
A vulnerability, which was classified as problematic, has been found in SourceCodester Game Result Matrix System 1.0. Affected by this issue is some unknown functionality of the file /dipam/save-delegates.php of the component GET Parameter Handler. The manipulation of the argument del_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/M9KJ-TEAM/CVEReport/blob/main/XSS3.md https://vuldb.com/?ctiid.232238 https://vuldb.com/?id.232238 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-32683 – URL deny list bypass via oEmbed and image URLs when generating previews in Synapse
https://notcve.org/view.php?id=CVE-2023-32683
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client: 1. For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. 2. For discovered image URLs, any non-image response is discarded. • https://github.com/matrix-org/synapse/pull/15601 https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2 • CWE-863: Incorrect Authorization CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2023-32682 – Improper checks for deactivated users during login in synapse
https://notcve.org/view.php?id=CVE-2023-32682
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. In affected versions it may be possible for a deactivated user to login when using uncommon configurations. This only applies if any of the following are true: 1. JSON Web Tokens are enabled for login via the `jwt_config.enabled` configuration setting. 2. The local password database is enabled via the `password_config.enabled` and `password_config.localdb_enabled` configuration settings *and* a user's password is updated via an admin API after a user is deactivated. • https://github.com/matrix-org/synapse/pull/15624 https://github.com/matrix-org/synapse/pull/15634 https://github.com/matrix-org/synapse/security/advisories/GHSA-26c5-ppr8-f33p https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2 https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account https://matrix-org.github.io/synapse/latest/jwt.html https://matrix-org.github.io/synapse/latest/usage& • CWE-287: Improper Authentication •
CVE-2022-39374 – Synapse Denial of service due to incorrect application of event authorization rules during state resolution
https://notcve.org/view.php?id=CVE-2022-39374
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0 Synapse es un servidor doméstico Matrix de código abierto escrito y mantenido por la Fundación Matrix.org. Si Synapse y un servidor doméstico malicioso están unidos a la misma habitación, el servidor doméstico malicioso puede engañar a Synapse para que acepte eventos previamente rechazados en su vista del estado actual de esa sala. • https://github.com/matrix-org/synapse/pull/13723 https://github.com/matrix-org/synapse/security/advisories/GHSA-p9qp-c452-f9r7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD • CWE-400: Uncontrolled Resource Consumption •
CVE-2022-39335 – Synapse does not apply enough checks to servers requesting auth events of events in a room
https://notcve.org/view.php?id=CVE-2022-39335
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. • https://github.com/matrix-org/synapse/issues/13288 https://github.com/matrix-org/synapse/pull/13823 https://github.com/matrix-org/synapse/security/advisories/GHSA-45cj-f97f-ggwv https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2MBNMZAFY4RCZL2VGBGAPKGB4JUPZVS • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-862: Missing Authorization •