matrix javascript_sdk 认证机制不恰当

admin 2023-11-30 05:49:50 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 matrix javascript_sdk 认证机制不恰当

CVE编号

CVE-2022-39249

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-29
漏洞描述
Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63...
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
https://github.com/matrix-org/matrix-spec-proposals/pull/3061
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in...
https://security.gentoo.org/glsa/202210-35
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 matrix javascript_sdk * Up to (excluding) 19.7.0
运行在以下环境
系统 alpine_3.16 riot-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_3.17 riot-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_3.18 element-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_edge element-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 amazon_2 thunderbird * Up to (excluding) 102.4.0-1.amzn2.0.1
运行在以下环境
系统 anolis_os_7 thunderbird * Up to (excluding) 102.4.0-1.0.1
运行在以下环境
系统 anolis_os_8 thunderbird * Up to (excluding) 102.4.0-1.0.1
运行在以下环境
系统 centos_7 thunderbird * Up to (excluding) 102.4.0-1.el7_9
运行在以下环境
系统 centos_8 thunderbird * Up to (excluding) 102.4.0-1.el8_6
运行在以下环境
系统 debian_10 node-matrix-js-sdk * Up to (including) 0.9.2-1
运行在以下环境
系统 debian_11 node-matrix-js-sdk * Up to (including) 9.3.0+~cs9.9.16-2
运行在以下环境
系统 debian_sid node-matrix-js-sdk * Up to (including) 9.11.0+~cs9.9.16-2
运行在以下环境
系统 opensuse_Leap_15.3 MozillaThunderbird * Up to (excluding) 102.4.0-150200.8.85.1
运行在以下环境
系统 opensuse_Leap_15.4 MozillaThunderbird * Up to (excluding) 102.4.0-150200.8.85.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 102.4.0-1.0.1.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 102.4.0-1.0.1.el8_6
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 102.4.0-1.el9_0
运行在以下环境
系统 redhat_7 thunderbird * Up to (excluding) 102.4.0-1.el7_9
运行在以下环境
系统 redhat_8 thunderbird * Up to (excluding) 102.4.0-1.el8_6
运行在以下环境
系统 redhat_9 thunderbird * Up to (excluding) 102.4.0-1.el9_0
运行在以下环境
系统 ubuntu_18.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.18.04.1
运行在以下环境
系统 ubuntu_20.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.20.04.1
运行在以下环境
系统 ubuntu_22.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.22.04.1
运行在以下环境
系统 ubuntu_22.10 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.22.10.1
阿里云评分 6.3
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-287 认证机制不恰当
CWE-322 未进行实体认证的密钥交换
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1