45 results (0.003 seconds)

CVSS: 5.3EPSS: %CPEs: 1EXPL: 0

Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. • https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr https://github.com/matrix-org/matrix-spec-proposals/pull/3916 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.5EPSS: %CPEs: 1EXPL: 0

Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amounts of remote media. The default rate limit strategy is insufficient to mitigate this. This can lead to a denial of service, ranging from further media uploads/downloads failing to completely unavailability of the Synapse process, depending on how Synapse was deployed. Synapse 1.106 introduces a new "leaky bucket" rate limit on remote media downloads to reduce the amount of data a user can request at a time. • https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.2EPSS: %CPEs: 1EXPL: 0

Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type. • https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2 https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518 https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.7EPSS: %CPEs: 1EXPL: 0

Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts the invited user's /sync functionality. Synapse 1.120.1 rejects such invalid invites received over federation and restores the ability to sync for affected users. • https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h • CWE-20: Improper Input Validation •

CVSS: 8.2EPSS: %CPEs: 1EXPL: 0

Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon image formats, potentially invoking external tools like Ghostscript for processing. This significantly expands the attack surface in a historically vulnerable area, presenting a risk that far outweighs the benefit, particularly since these formats are rarely used on the open web or within the Matrix ecosystem. Synapse 1.120.1 addresses the issue by restricting thumbnail generation to images in the following widely used formats: PNG, JPEG, GIF, and WebP. This vulnerability is fixed in 1.120.1. • https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g • CWE-434: Unrestricted Upload of File with Dangerous Type •