Skip to content

Open redirects on some federation and push requests

Low severity GitHub Reviewed Published Feb 25, 2021 in matrix-org/synapse • Updated Feb 1, 2023

Package

pip matrix-synapse (pip)

Affected versions

< 1.25.0

Patched versions

1.25.0

Description

Impact

Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible.

For the most thorough protection server administrators should remove the deprecated federation_ip_range_blacklist from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new ip_range_blacklist and ip_range_whitelist settings if more specific control is necessary.

Patches

Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954.

Workarounds

Requests to internal IP addresses could be blocked at the system or network level.

References

@clokep clokep published to matrix-org/synapse Feb 25, 2021
Reviewed Feb 26, 2021
Published to the GitHub Advisory Database Feb 26, 2021
Published by the National Vulnerability Database Feb 26, 2021
Last updated Feb 1, 2023

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Weaknesses

CVE ID

CVE-2021-21273

GHSA ID

GHSA-v936-j8gp-9q3p

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.