Skip to content

Synapse Denial of service due to incorrect application of event authorization rules during state resolution

Moderate severity GitHub Reviewed Published May 24, 2023 in matrix-org/synapse • Updated Nov 11, 2023

Package

pip matrix-synapse (pip)

Affected versions

>= 1.62.0, < 1.68.0

Patched versions

1.68.0

Description

Impact

If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected.

Synapse homeservers are affected by this issue if and only if they are joined to rooms which members of untrusted homeservers are joined or invited to.

  • Synapse homeservers in rooms available over public federation are affected.
  • Synapse homeservers with federation disabled are not affected.
  • Synapse homeservers in a closed federation containing only trusted servers are not affected.
  • Synapse homeservers which are only joined to rooms with federation disabled1 are not affected.

Patches

Administrators of homeservers with federation enabled are advised to upgrade to 1.68.0 or higher.

Workarounds

  • Federation can be disabled by setting federation_domain_whitelist to an empty list ([]). from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0

References

For more information

If you have any questions or comments about this advisory, e-mail us at security@matrix.org.

References

Footnotes

  1. See m.federate in the m.room.create definition.

@dkasak dkasak published to matrix-org/synapse May 24, 2023
Published to the GitHub Advisory Database May 24, 2023
Reviewed May 24, 2023
Published by the National Vulnerability Database May 26, 2023
Last updated Nov 11, 2023

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2022-39374

GHSA ID

GHSA-p9qp-c452-f9r7

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.