// For flags

CVE-2023-43656

Sandbox escape for instances that have enabled transformation functions in matrix-hookshot

Severity Score

9.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

matrix-hookshot is a Matrix bot for connecting to external services like GitHub, GitLab, JIRA, and more. Instances that have enabled transformation functions (those that have `generic.allowJsTransformationFunctions` in their config), may be vulnerable to an attack where it is possible to break out of the `vm2` sandbox and as a result Hookshot will be vulnerable to this. This problem is only likely to affect users who have allowed untrusted users to apply their own transformation functions. If you have only enabled a limited set of trusted users, this threat is reduced (though not eliminated). Version 4.5.0 and above of hookshot include a new sandbox library which should better protect users. Users are advised to upgrade. Users unable to upgrade should disable `generic.allowJsTransformationFunctions` in the config.

Matrix-hookshot es un bot de Matrix para conectarse a servicios externos como GitHub, GitLab, JIRA y más. Las instancias que tienen funciones de transformación habilitadas (aquellas que tienen `generic.allowJsTransformationFunctions` en su configuración) pueden ser vulnerables a un ataque en el que es posible salir del entorno limitado de `vm2` y, como resultado, Hookshot será vulnerable a esto. Es probable que este problema solo afecte a los usuarios que han permitido que usuarios que no son de confianza apliquen sus propias funciones de transformación. Si solo ha habilitado un conjunto limitado de usuarios confiables, esta amenaza se reduce (aunque no se elimina). La versión 4.5.0 y superiores de hookshot incluyen una nueva biblioteca sandbox que debería proteger mejor a los usuarios. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben desactivar `generic.allowJsTransformationFunctions` en la configuración.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-09-20 CVE Reserved
  • 2023-09-27 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Matrix
Search vendor "Matrix"
Hookshot
Search vendor "Matrix" for product "Hookshot"
< 4.5.0
Search vendor "Matrix" for product "Hookshot" and version " < 4.5.0"
-
Affected