Vulnerability Name:

CVE-2020-26257 (CCN-193782)

Assigned:2020-12-09
Published:2020-12-09
Updated:2022-10-12
Summary:Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference "homeserver" implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-400
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2020-26257

Source: XF
Type: UNKNOWN
matrix-cve202026257-dos(193782)

Source: MISC
Type: Release Notes, Third Party Advisory
https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/matrix-org/synapse/commit/3ce2f303f15f6ac3dc352298972dc6e04d9b7a8b

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/matrix-org/synapse/pull/8776

Source: CCN
Type: synapse GIT Repository
Denial of service attack via incorrect parameters to federation APIs

Source: CONFIRM
Type: Third Party Advisory
https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-eeb66c2ece

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2020-a2172c484d

Vulnerable Configuration:Configuration 1:
  • cpe:/a:matrix:synapse:*:*:*:*:*:*:*:* (Version < 1.23.1)

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:matrix:synapse:1.23.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112972
    P
    matrix-synapse-1.43.0-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106421
    P
    matrix-synapse-1.43.0-1.1 on GA media (Moderate)
    2021-10-01
    BACK
    matrix synapse *
    fedoraproject fedora 32
    fedoraproject fedora 33
    matrix synapse 1.23.0 -