// For flags

CVE-2023-38690

matrix-appservice-irc IRC command injection via admin commands containing newlines

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. Versions 1.0.1 and above are patched. There are no robust workarounds to the bug. One may disable dynamic channels in the config to disable the most common execution method but others may exist.

matrix-appservice-irc es un puente IRC Node.js para Matrix. Antes de la versión 1.0.1, era posible crear un comando con nuevas líneas que no se analizaba correctamente. Esto significaba que podías pasar una cadena de comandos como nombre de canal, que luego sería ejecutado por el bot del puente IRC. Las versiones 1.0.1 y superiores están parcheadas. No hay soluciones robustas para el fallo. Uno puede desactivar los canales dinámicos en la configuración para desactivar el método de ejecución más común, pero pueden existir otros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-07-24 CVE Reserved
  • 2023-08-04 CVE Published
  • 2024-09-05 EPSS Updated
  • 2024-10-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Matrix
Search vendor "Matrix"
Matrix Irc Bridge
Search vendor "Matrix" for product "Matrix Irc Bridge"
< 1.0.1
Search vendor "Matrix" for product "Matrix Irc Bridge" and version " < 1.0.1"
node.js
Affected