matrix-appservice-irc IRC command injection via admin commands containing newlines
Moderate severity
GitHub Reviewed
Published
Aug 4, 2023
in
matrix-org/matrix-appservice-irc
•
Updated Jun 20, 2024
Description
Published by the National Vulnerability Database
Aug 4, 2023
Published to the GitHub Advisory Database
Aug 4, 2023
Reviewed
Aug 4, 2023
Last updated
Jun 20, 2024
Impact
It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot.
Patches
Versions 1.0.1 and above are patched.
Workarounds
There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge.
Credits
Discovered and reported by Val Lorentz.
For more information
If you have any questions or comments about this advisory email us at security@matrix.org.
References