Page 7 of 37 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation. Matrix Synapse en versiones anteriores a la 0.33.3.1 permite que atacantes remotos suplanten eventos y provoquen otro tipo de impacto sin especificar aprovechando la validación incorrecta de firmas de transacciones y eventos. • https://github.com/matrix-org/synapse/issues/3796#event-1833126269 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRW7YR2H3ASUSYX4AO4KMY3FNVDNYW3P https://matrix.org/blog/2018/09/06/critical-security-update-synapse-0-33-3-1 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In Synapse before 0.31.2, unauthorised users can hijack rooms when there is no m.room.power_levels event in force. En Synapse en versiones anteriores a la 0.31.2, los usuarios no autorizados pueden secuestrar salas cuando no hay ningún evento m.room.power_levels en aplicación. • https://bugs.debian.org/901549 https://github.com/matrix-org/matrix-doc/issues/1304 https://matrix.org/blog/2018/06/14/security-update-synapse-0-31-2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The on_get_missing_events function in handlers/federation.py in Matrix Synapse before 0.31.1 has a security bug in the get_missing_events federation API where event visibility rules were not applied correctly. La función on_get_missing_events en handlers/federation.py en Matrix Synapse en versiones anteriores a la 0.31.1 tiene un error de seguridad en la API de federación get_missing_events donde las reglas de visibilidad de evento no se aplicaron correctamente. • https://github.com/matrix-org/synapse/pull/3371 https://github.com/matrix-org/synapse/releases/tag/v0.31.1 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018. Matrix Synapse en versiones anteriores a la 0.28.1 es propenso a un error de denegación de servicio (DoS) en el que los eventos maliciosos inyectados con una profundidad de = 2^63 - 1 hacen que las habitaciones no puedan usarse. Esto está relacionado con federation/federation_base.py y handlers/message.py, tal y como se explotaron "in the wild" en abril de 2018. • https://github.com/matrix-org/synapse/commit/33f469ba19586bbafa0cf2c7d7c35463bdab87eb https://matrix.org/blog/2018/05/01/security-update-synapse-0-28-1 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 2%CPEs: 12EXPL: 1

In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. • https://github.com/HuSoul/CVE-2017-15708 http://www.securityfocus.com/bid/102154 https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9%40%3Cdev.synapse.apache.org%3E https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41631865c6%40%3Ccommits.doris.apache.org%3E https://security.gentoo.org/glsa/202107-37 https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •