Skip to content

Improper authorisation of members discloses room membership to non-members

Low severity GitHub Reviewed Published Aug 31, 2021 in matrix-org/synapse • Updated Feb 1, 2023

Package

pip matrix-synapse (pip)

Affected versions

< 1.41.1

Patched versions

1.41.1

Description

Impact

Unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with shared history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room.

Patches

Server administrators should upgrade to 1.41.1 or later.

Workarounds

Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the following endpoints:

  • /_matrix/client/r0/rooms/{room_id}/members with at query parameter
  • /_matrix/client/unstable/rooms/{room_id}/members with at query parameter

References

n/a

For more information

If you have any questions or comments about this advisory, e-mail us at security@matrix.org.

References

@richvdh richvdh published to matrix-org/synapse Aug 31, 2021
Published by the National Vulnerability Database Aug 31, 2021
Reviewed Aug 31, 2021
Published to the GitHub Advisory Database Sep 1, 2021
Last updated Feb 1, 2023

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2021-39164

GHSA ID

GHSA-3x4c-pq33-4w3q

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.